HEX
Server: Apache
System: Linux vpshost0650.publiccloud.com.br 4.4.79-grsec-1.lc.x86_64 #1 SMP Wed Aug 2 14:18:21 -03 2017 x86_64
User: bandeirantesbomb3 (10068)
PHP: 8.0.7
Disabled: apache_child_terminate,dl,escapeshellarg,escapeshellcmd,exec,link,mail,openlog,passthru,pcntl_alarm,pcntl_exec,pcntl_fork,pcntl_get_last_error,pcntl_getpriority,pcntl_setpriority,pcntl_signal,pcntl_signal_dispatch,pcntl_sigprocmask,pcntl_sigtimedwait,pcntl_sigwaitinfo,pcntl_strerror,pcntl_wait,pcntl_waitpid,pcntl_wexitstatus,pcntl_wifexited,pcntl_wifsignaled,pcntl_wifstopped,pcntl_wstopsig,pcntl_wtermsig,php_check_syntax,php_strip_whitespace,popen,proc_close,proc_open,shell_exec,symlink,system
Upload Files
File: //home/bandeirantesbomb3/logs/error_log
[Sun Mar 15 03:17:30.071144 2026] [ssl:warn] [pid 6229:tid 140412349433728] AH01909: bandeirantesbomb3.hospedagemdesites.ws:443:0 server certificate does NOT include an ID which matches the server name
[Sun Mar 15 03:20:21.908692 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.244.31:41284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZPpbABkC4fWIHEf8EUawAAAFI"]
[Sun Mar 15 03:22:45.016228 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:57704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZQNbABkC4fWIHEf8EU3gAAAEY"]
[Sun Mar 15 03:25:27.150757 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:50058] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZQ1nbQATo66fKoS7xsZgAAAMU"]
[Sun Mar 15 03:27:48.291248 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:41760] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZRZLABkC4fWIHEf8EVvwAAAEs"]
[Sun Mar 15 03:30:42.844647 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:37920] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZSErABkC4fWIHEf8EWLgAAAEY"]
[Sun Mar 15 03:33:07.819009 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.228.16:34980] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZSoXjZBu2q05ozVU9-dwAAAUs"]
[Sun Mar 15 03:35:13.589259 2026] [:error] [pid 21805:tid 140411741927168] [client 129.146.135.227:54487] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZTIbABkC4fWIHEf8EXLAAAAEA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:35:25.008263 2026] [access_compat:error] [pid 21806:tid 140411683178240] [client 141.98.11.23:52595] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 03:35:29.079079 2026] [access_compat:error] [pid 21946:tid 140411716749056] [client 141.98.11.23:53310] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 03:35:59.230034 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:49550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZTT9SswJuvopo3lOiR4AAAAJM"]
[Sun Mar 15 03:36:04.206592 2026] [:error] [pid 21533:tid 140411741927168] [client 129.146.135.227:53097] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZTVHjZBu2q05ozVU9_ZwAAAUA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:42:16.972785 2026] [:error] [pid 21805:tid 140411590858496] [client 129.146.135.227:63615] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZUyLABkC4fWIHEf8EZhQAAAFI"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:48:48.417398 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:35784] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZWUNSswJuvopo3lOiUfAAAAIU"]
[Sun Mar 15 03:51:52.033328 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:59270] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZXCLABkC4fWIHEf8EbwwAAAEw"]
[Sun Mar 15 03:54:13.879629 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:36466] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZXldSswJuvopo3lOiWEQAAAIw"]
[Sun Mar 15 03:57:04.586739 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:37632] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZYQHbQATo66fKoS7xzWgAAANc"]
[Sun Mar 15 03:59:14.806240 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:39056] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZYwnjZBu2q05ozVU-FgwAAAUU"]
[Sun Mar 15 04:02:25.903185 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:51936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZZgdSswJuvopo3lOiXZwAAAJM"]
[Sun Mar 15 04:04:41.789626 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.228.16:41336] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZaCXbQATo66fKoS7x05wAAAM8"]
[Sun Mar 15 04:07:31.099101 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:35354] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZas7ABkC4fWIHEf8Ee7wAAAFE"]
[Sun Mar 15 04:09:52.076697 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.228.16:37196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZbQHbQATo66fKoS7x14AAAAMc"]
[Sun Mar 15 04:12:51.760046 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:52464] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZb87ABkC4fWIHEf8Ef6wAAAFU"]
[Sun Mar 15 04:15:17.654365 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.228.16:53710] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZchbABkC4fWIHEf8EgRgAAAEU"]
[Sun Mar 15 04:18:04.227703 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:44758] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZdLHjZBu2q05ozVU-ItgAAAUM"]
[Sun Mar 15 04:20:29.499472 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:39392] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZdvdSswJuvopo3lOiaeQAAAI8"]
[Sun Mar 15 04:23:21.775842 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.244.31:51118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZeadSswJuvopo3lOibBAAAAIk"]
[Sun Mar 15 04:25:55.322841 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:40948] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZfA3bQATo66fKoS7x5BAAAAMI"]
[Sun Mar 15 04:28:32.635419 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.244.31:45304] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZfoHbQATo66fKoS7x5iAAAAM0"]
[Sun Mar 15 04:30:58.472517 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:45208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZgMrABkC4fWIHEf8EjBwAAAFg"]
[Sun Mar 15 04:33:56.235866 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.244.31:45336] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZg5NSswJuvopo3lOic3AAAAI8"]
[Sun Mar 15 04:36:17.234498 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:43090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZhcXjZBu2q05ozVU-L0gAAAVQ"]
[Sun Mar 15 04:39:06.459821 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.244.31:60100] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZiGnbQATo66fKoS7x7jAAAAM8"]
[Sun Mar 15 04:52:00.097615 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:42534] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZlIHjZBu2q05ozVU-OcwAAAVQ"]
[Sun Mar 15 04:55:00.963720 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:55270] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZl1HjZBu2q05ozVU-O2QAAAUs"]
[Sun Mar 15 04:57:21.918825 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:55818] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZmYbABkC4fWIHEf8EnUQAAAFc"]
[Sun Mar 15 05:00:09.542199 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.244.31:36400] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZnCXjZBu2q05ozVU-PnAAAAUU"]
[Sun Mar 15 05:02:30.098788 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:52486] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZnlrABkC4fWIHEf8EocwAAAFc"]
[Sun Mar 15 05:05:34.327313 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:33046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZoTtSswJuvopo3lOiiNgAAAIs"]
[Sun Mar 15 05:07:49.774938 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.228.16:36948] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZo1dSswJuvopo3lOiijAAAAIA"]
[Sun Mar 15 05:10:40.284649 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:49396] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZpgNSswJuvopo3lOijIQAAAIo"]
[Sun Mar 15 05:13:00.546857 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:49240] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZqDHbQATo66fKoS7yBmAAAAMA"]
[Sun Mar 15 05:16:02.548821 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:56110] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZqwnbQATo66fKoS7yCBAAAAMQ"]
[Sun Mar 15 05:18:21.139102 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:39856] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZrTdSswJuvopo3lOikVgAAAIw"]
[Sun Mar 15 05:20:06.395859 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:60442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZrttSswJuvopo3lOiktAAAAIw"]
[Sun Mar 15 05:21:13.405857 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.244.31:60650] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZr-bABkC4fWIHEf8ErsQAAAFM"]
[Sun Mar 15 05:23:23.375460 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.228.16:49836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZse3jZBu2q05ozVU-T0gAAAVI"]
[Sun Mar 15 05:26:31.057966 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:42350] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZtN3jZBu2q05ozVU-URAAAAUY"]
[Sun Mar 15 05:28:48.652978 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:47616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZtwLABkC4fWIHEf8Es5QAAAE8"]
[Sun Mar 15 05:31:36.730828 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44440] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZuaNSswJuvopo3lOimtAAAAIU"]
[Sun Mar 15 05:33:55.316823 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:57962] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZu83jZBu2q05ozVU-VbAAAAUw"]
[Sun Mar 15 05:37:04.459818 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:33596] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZvsHjZBu2q05ozVU-V9AAAAUk"]
[Sun Mar 15 05:39:16.565787 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:60116] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZwNHjZBu2q05ozVU-WVgAAAUQ"]
[Sun Mar 15 05:42:11.935122 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:44368] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZw43bQATo66fKoS7yGSQAAAMQ"]
[Sun Mar 15 05:55:00.299465 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:44756] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZz5HbQATo66fKoS7yJbAAAAM4"]
[Sun Mar 15 05:57:55.230330 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:34086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ0k9SswJuvopo3lOircwAAAJY"]
[Sun Mar 15 06:00:15.846933 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:55294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ1H3bQATo66fKoS7yKKAAAAMI"]
[Sun Mar 15 06:03:01.670673 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.244.31:41216] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ1xXjZBu2q05ozVU-aWQAAAUA"]
[Sun Mar 15 06:05:22.499326 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:60316] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ2UrABkC4fWIHEf8Ey-QAAAEM"]
[Sun Mar 15 06:08:21.593541 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.244.31:53622] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ3BbABkC4fWIHEf8EzigAAAEo"]
[Sun Mar 15 06:10:45.728352 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:55010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ3lXjZBu2q05ozVU-bywAAAUQ"]
[Sun Mar 15 06:14:24.269877 2026] [:error] [pid 21806:tid 140411733534464] [client 94.26.106.205:39920] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4cNSswJuvopo3lOiutQAAAIE"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:28.049556 2026] [:error] [pid 21946:tid 140411741927168] [client 94.26.106.205:39914] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dHbQATo66fKoS7yNWAAAAMA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:29.519179 2026] [:error] [pid 21946:tid 140411699963648] [client 94.26.106.205:39914] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dXbQATo66fKoS7yNYAAAAMU"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:29.763774 2026] [:error] [pid 21946:tid 140411574073088] [client 94.26.106.205:39916] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dXbQATo66fKoS7yNYwAAANQ"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:31.602461 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:51154] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ4d9SswJuvopo3lOiuwQAAAJQ"]
[Sun Mar 15 06:15:48.174794 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.228.16:46826] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ4xHbQATo66fKoS7yNrwAAANI"]
[Sun Mar 15 06:19:34.054556 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:57468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ5pnjZBu2q05ozVU-dqgAAAUQ"]
[Sun Mar 15 06:21:08.647385 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:52832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ6BLABkC4fWIHEf8E2QQAAAEg"]
[Sun Mar 15 06:25:01.967076 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:48130] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ67bABkC4fWIHEf8E3BQAAAFg"]
[Sun Mar 15 06:26:15.782526 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:37728] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ7N7ABkC4fWIHEf8E3MAAAAEo"]
[Sun Mar 15 06:30:09.084122 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:40062] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ8IdSswJuvopo3lOixewAAAJc"]
[Sun Mar 15 06:31:38.703859 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:40754] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ8erABkC4fWIHEf8E4TAAAAEY"]
[Sun Mar 15 06:35:25.419851 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.244.31:33084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ9XXjZBu2q05ozVU-gdAAAAU8"]
[Sun Mar 15 06:36:49.908144 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:57440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ9sdSswJuvopo3lOiyrAAAAII"]
[Sun Mar 15 06:40:35.703568 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:45714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ-k3bQATo66fKoS7yScgAAAMk"]
[Sun Mar 15 06:42:14.381310 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:51474] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ-9nbQATo66fKoS7yS1AAAAMQ"]
[Sun Mar 15 06:46:01.114754 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.244.31:39020] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ_2XjZBu2q05ozVU-jGQAAAVU"]
[Sun Mar 15 06:57:56.214903 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:35632] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaCpLABkC4fWIHEf8E-2QAAAE4"]
[Sun Mar 15 07:00:40.813782 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 45.227.253.15:38562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:06.322555 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:28.125806 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:49.125804 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:12.329781 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:34.129773 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:47.726935 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:35240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaDx9SswJuvopo3lOi5pAAAAII"]
[Sun Mar 15 07:02:55.133775 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:11.683174 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:35808] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaD39SswJuvopo3lOi5vQAAAJE"]
[Sun Mar 15 07:03:16.110191 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:37.122061 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:58.377809 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:04:20.117807 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:04:42.362784 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:04.141811 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:25.130879 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:46.128180 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:08.125797 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:29.577935 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:51.058095 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:12.141816 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:33.125851 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:52.261521 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:49022] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaE-HjZBu2q05ozVU-oSQAAAUs"]
[Sun Mar 15 07:07:55.138059 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:16.137132 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:37.121813 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:58.126577 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:09:20.027826 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:09:30.012160 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.228.16:49618] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaFWtSswJuvopo3lOi6ogAAAIg"]
[Sun Mar 15 07:09:41.129794 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:02.133843 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:25.126695 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:46.137810 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:07.129809 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:29.129843 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:31.492032 2026] [access_compat:error] [pid 11972:tid 140411641214720] [client 161.97.104.217:64093] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 07:11:32.851718 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 161.97.104.217:65348] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:48.705041 2026] [access_compat:error] [pid 21946:tid 140411607643904] [client 161.97.104.217:49400] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:50.092462 2026] [access_compat:error] [pid 21806:tid 140411557287680] [client 161.97.104.217:49428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 07:11:50.125773 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:51.594121 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 161.97.104.217:49428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:51.801483 2026] [access_compat:error] [pid 21946:tid 140411708356352] [client 161.97.104.217:49400] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 07:12:12.129820 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:12:33.134029 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:12:54.125844 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:09.221944 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.244.31:52532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaGNbABkC4fWIHEf8FBiQAAAFM"]
[Sun Mar 15 07:13:15.073856 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:37.125781 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:58.128229 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:14:19.125835 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:14:40.046911 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:34550] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaGkHbQATo66fKoS7ya3QAAAMQ"]
[Sun Mar 15 07:14:41.045850 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:03.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:25.121196 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:47.129829 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:09.137862 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:31.133822 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:52.145769 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:13.917818 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:35.137963 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:56.070832 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:18:17.041824 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:18:18.913956 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:44640] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaHanbQATo66fKoS7ybfwAAAMU"]
[Sun Mar 15 07:18:39.021904 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:00.142327 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:21.113901 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:42.149787 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:58.598958 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.228.16:54374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaHzpqj1wV0Si-OkecvzgAAABY"]
[Sun Mar 15 07:20:03.144865 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:20:24.129879 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:20:45.137845 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:06.125858 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:28.138001 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:50.137805 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:11.113932 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:32.110158 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:53.037811 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:15.132393 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:36.157839 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:40.953221 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.244.31:60134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaIrHjZBu2q05ozVU-siQAAAUg"]
[Sun Mar 15 07:23:57.121888 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40954] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:24:19.097174 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:24:40.045817 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:01.124607 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:05.418493 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:43208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaJAHjZBu2q05ozVU-srAAAAUE"]
[Sun Mar 15 07:25:22.129819 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:44.096109 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:05.133861 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:26.129856 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:47.149879 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:09.125822 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:31.133777 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:52.130220 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:13.149817 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:35.149608 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:49.982273 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.244.31:46188] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaJ4Zqj1wV0Si-OkecxCwAAAAY"]
[Sun Mar 15 07:28:56.129842 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:17.098484 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:38.120610 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:59.122124 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:30:18.485019 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:48832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaKOnjZBu2q05ozVU-tbgAAAUg"]
[Sun Mar 15 07:30:20.137816 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:30:41.125782 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:02.084033 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:24.033835 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:46.133832 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:48.744770 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] [client 157.15.40.93:45384] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 07:32:07.121862 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:32:29.057844 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:32:50.021883 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:11.050035 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:32.097964 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:53.137775 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:07.238334 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:58520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaLH5qj1wV0Si-OkecyCgAAABc"]
[Sun Mar 15 07:34:14.129970 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:35.127355 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:56.137786 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:17.129794 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:33.479003 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.228.16:48604] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaLdZqj1wV0Si-OkecyTgAAAAM"]
[Sun Mar 15 07:35:38.125800 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:59.132796 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:36:21.077807 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:36:42.149833 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:10.120875 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:32.138249 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:53.129956 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:14.138444 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:35.085855 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:56.128359 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:07.943883 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.244.31:38106] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaMS3jZBu2q05ozVU-uzwAAAUU"]
[Sun Mar 15 07:39:17.057863 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:38.121800 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:59.115638 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:20.681813 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:42.126529 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:56.734911 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.228.16:45956] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaMuJqj1wV0Si-Okecy6QAAABU"]
[Sun Mar 15 07:41:03.568098 2026] [access_compat:error] [pid 21946:tid 140411641214720] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Sun Mar 15 07:41:03.746586 2026] [access_compat:error] [pid 21946:tid 140411565680384] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/style.php
[Sun Mar 15 07:41:03.935029 2026] [access_compat:error] [pid 21946:tid 140411590858496] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/themes/style.php
[Sun Mar 15 07:41:04.049838 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:41:04.117191 2026] [access_compat:error] [pid 21805:tid 140411607643904] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/style.php
[Sun Mar 15 07:41:04.335833 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/style.php
[Sun Mar 15 07:41:04.517066 2026] [access_compat:error] [pid 21805:tid 140411548894976] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/chosen.php
[Sun Mar 15 07:41:04.695428 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Sun Mar 15 07:41:04.878817 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/flower.php
[Sun Mar 15 07:41:05.057197 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gifclass.php
[Sun Mar 15 07:41:05.235508 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bless.php
[Sun Mar 15 07:41:05.415389 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/class-t.api.php
[Sun Mar 15 07:41:05.595154 2026] [access_compat:error] [pid 21533:tid 140411632822016] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/blurbs.php
[Sun Mar 15 07:41:05.774849 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akcc.php
[Sun Mar 15 07:41:05.953652 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/abcd.php
[Sun Mar 15 07:41:06.133787 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/shelp.php
[Sun Mar 15 07:41:06.315200 2026] [access_compat:error] [pid 21806:tid 140411590858496] [client 104.28.246.115:51308] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cord.php
[Sun Mar 15 07:41:06.494160 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 104.28.246.115:51308] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dex.php
[Sun Mar 15 07:41:25.117785 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:41:46.035444 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:07.125819 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:31.092905 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:54.494935 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:16.061883 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:37.041803 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:58.110016 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:44:19.069816 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:44:36.247118 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:45776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaNlNSswJuvopo3lOi_xgAAAIE"]
[Sun Mar 15 07:44:40.133837 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:01.137848 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:22.125788 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:43.149831 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:03.814175 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:43230] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaN63jZBu2q05ozVU-vqAAAAVE"]
[Sun Mar 15 07:46:04.122355 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:25.125786 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:46.058262 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:07.055601 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:28.120850 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:52.161334 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:48:14.113985 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:48:38.524217 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:00.057851 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:21.133846 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:38.034434 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:51830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaOwnbQATo66fKoS7ygMAAAAMM"]
[Sun Mar 15 07:49:42.121830 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:03.118181 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:24.125789 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:45.117815 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:06.128776 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:27.121834 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:48.126869 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:09.069813 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:31.069894 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:52.153795 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:53:13.097847 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:53:36.089940 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:00.125822 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:21.085815 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:42.085827 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:03.130221 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:24.117785 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:45.137812 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:06.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:27.122391 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:49.125800 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:10.104476 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:31.127024 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:52.129814 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:13.057838 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:34.121864 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:58.133814 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:59:21.129873 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:59:42.129786 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:03.336571 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:25.129038 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:46.117874 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:07.126514 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:28.129797 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:48.930954 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:55972] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaRnNSswJuvopo3lOjCHgAAAIw"]
[Sun Mar 15 08:01:49.113141 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:10.125808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:31.133790 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:52.132575 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:13.129760 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:34.033909 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:55.123088 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:04:20.129815 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:04:42.125807 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:04.193896 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:25.059018 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:33.205800 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:36286] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaSfXjZBu2q05ozVU-yLQAAAVc"]
[Sun Mar 15 08:05:46.130495 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:07.125843 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:28.060767 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:49.065929 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:57.565396 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:44122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaS0XbQATo66fKoS7yibAAAAMI"]
[Sun Mar 15 08:07:10.091919 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:07:34.153843 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:07:55.117862 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:16.121266 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:38.093863 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:59.057850 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:09:20.273801 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:09:42.121952 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:03.133821 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:24.160319 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:41.204577 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.244.31:38048] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaTsdSswJuvopo3lOjDWAAAAIc"]
[Sun Mar 15 08:10:45.121671 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:10.125818 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:31.129869 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:52.057820 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:13.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:21.859693 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:60024] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaUFbABkC4fWIHEf8FJUgAAAFE"]
[Sun Mar 15 08:12:34.133814 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:55.129927 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:16.145804 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:37.125805 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:59.390110 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:14:21.125821 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:14:42.134006 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:04.125929 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:25.129808 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:46.141776 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:05.304650 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:47342] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaU9XjZBu2q05ozVU-zowAAAUY"]
[Sun Mar 15 08:16:08.125822 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:29.057830 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:50.131671 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:11.129813 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:32.121793 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:33.052056 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.228.16:35836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaVTXjZBu2q05ozVU-z4gAAAUI"]
[Sun Mar 15 08:17:53.133877 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:14.121224 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:35.137830 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:56.041806 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:17.073861 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:38.053791 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:59.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:20:21.069878 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:20:42.134573 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:03.117780 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:11.663314 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:47390] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaWJ5qj1wV0Si-Okec5KwAAABU"]
[Sun Mar 15 08:21:24.125809 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:45.036179 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:06.029806 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:28.121788 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:49.129821 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:56.010840 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:51126] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaWkHjZBu2q05ozVU-0tAAAAVU"]
[Sun Mar 15 08:23:10.057903 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:23:31.122637 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:23:52.081829 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:13.121797 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:34.125850 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:55.075111 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:25:17.141829 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:25:39.144775 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:01.133832 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:22.057990 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:27.807633 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:39034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaXY5qj1wV0Si-Okec6CgAAABU"]
[Sun Mar 15 08:26:43.137843 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:06.122214 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:27.121843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:48.130059 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:06.866756 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:56106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaXxnbQATo66fKoS7ylgQAAAM4"]
[Sun Mar 15 08:28:09.121863 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:30.125820 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:51.125806 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:12.088535 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:34.129777 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:55.133787 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:16.125796 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:37.125813 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:59.033930 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:31:20.134665 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:31:34.142660 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:60102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaYlnjZBu2q05ozVU-1-gAAAUY"]
[Sun Mar 15 08:31:42.133828 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:03.493822 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:25.130873 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:47.037925 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:08.123481 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:23.450478 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.228.16:46770] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaZA3jZBu2q05ozVU-2OQAAAUA"]
[Sun Mar 15 08:33:30.085868 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:51.129864 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:12.125781 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:33.041838 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:54.125827 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:16.079241 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:37.085812 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:58.125846 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:36:20.125827 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:36:41.129837 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:02.121337 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:02.146569 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:41084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaZ3rABkC4fWIHEf8FM4QAAAEY"]
[Sun Mar 15 08:37:23.069842 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:44.123788 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:05.041831 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:26.137783 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:30.678525 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:34910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaaNtSswJuvopo3lOjHUQAAAII"]
[Sun Mar 15 08:38:52.127358 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:39:18.125778 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:39:39.127254 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:00.152892 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:22.125878 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:43.124505 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:04.057903 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:26.077940 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:48.185879 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:06.821570 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:39308] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ababDdSswJuvopo3lOjH2QAAAII"]
[Sun Mar 15 08:42:09.057857 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:30.120221 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:51.037947 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:12.125811 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:33.118120 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:47.382473 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.228.16:59308] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ababc9SswJuvopo3lOjIIgAAAJY"]
[Sun Mar 15 08:43:54.033852 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:44:15.125773 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:44:39.125779 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:00.129889 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:21.118330 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:44.101825 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:05.121790 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:26.125788 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:48.133668 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:09.125812 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:21.773404 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:40554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abacSXjZBu2q05ozVU-4LwAAAUQ"]
[Sun Mar 15 08:47:30.061893 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:51.069887 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:12.083113 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:34.121380 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:54.999788 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:53864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abacprABkC4fWIHEf8FOWQAAAEk"]
[Sun Mar 15 08:48:55.128651 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:16.133782 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:37.085825 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:59.121067 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:50:20.134769 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:50:41.121851 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:02.133842 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:23.141811 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:45.025810 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:07.132903 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:22.913770 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.244.31:50250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaddpqj1wV0Si-Okec-ZAAAAAE"]
[Sun Mar 15 08:52:28.047444 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:49.125821 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:10.084499 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:36.141946 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:57.113833 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:54:18.126307 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:54:39.128268 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:01.129734 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:22.113860 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:43.116024 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:04.121848 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:26.126998 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:47.134791 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:09.121824 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:34.361817 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:56.066265 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:17.157873 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:38.133829 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:59.085820 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:59:20.125792 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:59:41.131751 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:02.158189 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:23.138611 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:44.057814 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:06.057876 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:28.132446 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:49.125782 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:11.120166 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:32.123799 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:54.137806 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:15.118336 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:36.133873 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:58.120259 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:19.121828 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:40.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:44.651578 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:45134] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abagXHbQATo66fKoS7yrfwAAAMo"]
[Sun Mar 15 09:05:01.133781 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:05:24.127058 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:05:46.125814 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:07.033923 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:28.094216 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:50.133790 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:11.125815 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59214] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:33.065884 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:54.101930 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:14.562985 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:34374] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abahLnbQATo66fKoS7ysAwAAAMU"]
[Sun Mar 15 09:08:15.125878 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:36.129862 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:57.031539 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:19.125232 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:40.121793 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:46.440286 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.228.16:47190] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abahinjZBu2q05ozVU-7ZwAAAUc"]
[Sun Mar 15 09:10:01.129816 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32894] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:10:26.125760 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:10:47.041816 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:08.177836 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:29.137761 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:50.129809 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:12.137933 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:33.041886 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:55.061819 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:16.121871 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:17.760857 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.244.31:44678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaiXdSswJuvopo3lOjMvAAAAI4"]
[Sun Mar 15 09:13:37.129795 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:58.133793 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:14:19.125950 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:14:40.620256 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36338] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:02.173815 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36568] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:13.049262 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:53196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abai0XbQATo66fKoS7ytOgAAAMA"]
[Sun Mar 15 09:15:23.097846 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:44.047573 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:05.133800 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:26.124020 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:47.137784 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:09.381980 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:31.097909 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:52.809932 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:15.060170 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:36.165782 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:43.939542 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.244.31:55128] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abajo7ABkC4fWIHEf8FTQQAAAFI"]
[Sun Mar 15 09:18:57.063701 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:19:18.045809 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:19:40.129796 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:01.033872 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:20.110398 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:48620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abakBHbQATo66fKoS7yt8QAAAMQ"]
[Sun Mar 15 09:20:22.134874 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:43.053843 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:04.129781 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:26.125831 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:47.070147 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:08.093879 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:30.095950 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:51.131146 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:12.138664 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:34.109837 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:48.957359 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:59820] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abak1Jqj1wV0Si-OkedDqQAAABE"]
[Sun Mar 15 09:23:55.069811 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:16.133813 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:37.125780 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:58.121799 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:25:19.121770 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:25:37.118485 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:33662] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abalQdSswJuvopo3lOjOqwAAAII"]
[Sun Mar 15 09:25:40.117504 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:01.133792 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:22.133792 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:43.133889 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:05.137771 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:26.154032 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:47.133785 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:09.253772 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:31.985861 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:54.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:10.532863 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.244.31:40348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abamFnbQATo66fKoS7yvqAAAAMw"]
[Sun Mar 15 09:29:16.131416 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:37.137754 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:58.125818 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:19.133853 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48404] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:40.099610 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:44.430874 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.228.16:58492] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abamdJqj1wV0Si-OkedFFgAAAAQ"]
[Sun Mar 15 09:31:01.153801 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:31:22.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:31:43.141851 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:04.125783 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:25.073805 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:46.143449 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:07.057929 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:29.071067 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:50.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:12.033820 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:14.608921 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:52834] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abanRtSswJuvopo3lOjP9gAAAIw"]
[Sun Mar 15 09:34:33.057863 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:54.121793 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:15.150091 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52874] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:37.129840 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:59.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:36:06.527996 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:34878] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abanttSswJuvopo3lOjQSwAAAIY"]
[Sun Mar 15 09:36:21.125775 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:36:42.137811 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:03.153855 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:24.129794 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:45.125832 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:06.133788 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:27.136897 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:48.149802 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:09.150879 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:31.141793 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:39.034919 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:34126] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaoi7ABkC4fWIHEf8FWeQAAAFE"]
[Sun Mar 15 09:39:52.137846 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:13.126081 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:34.137767 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:59.646502 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:41:12.618554 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:55268] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abao6Jqj1wV0Si-OkedG6QAAAAo"]
[Sun Mar 15 09:41:23.109625 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:41:45.128251 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:06.115422 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:27.121857 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:48.125781 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:09.121780 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:31.125809 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:52.776990 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:14.137797 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:36.151837 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:46.279612 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.244.31:58864] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abapvpqj1wV0Si-OkedHawAAAA0"]
[Sun Mar 15 09:44:57.057868 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:45:18.119373 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:45:39.102973 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:01.135879 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:22.117773 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:34.880221 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.228.16:33098] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaqKnbQATo66fKoS7yyKAAAAME"]
[Sun Mar 15 09:46:43.133796 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33490] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:04.053871 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:25.129825 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:46.121862 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:07.146960 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:28.123104 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:50.129910 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:11.137856 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:32.129802 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:54.125793 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:13.600131 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.244.31:51152] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abarBXjZBu2q05ozVU_BmAAAAVQ"]
[Sun Mar 15 09:50:15.137878 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:37.398017 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:59.086076 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:51:20.129058 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:51:26.578405 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 20.17.162.97:35510] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/index.php5, referer: binance.com
[Sun Mar 15 09:51:37.613325 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.228.16:37006] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abarWZqj1wV0Si-OkedIUQAAABU"]
[Sun Mar 15 09:51:41.129930 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:02.141816 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:23.101860 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:44.045805 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:05.065841 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:26.139201 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:47.129802 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:09.141795 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:30.128012 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:51.137816 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:13.052409 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:35.121806 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:56.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:17.121008 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:22.003775 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.244.31:45298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abasdtSswJuvopo3lOjTKwAAAJI"]
[Sun Mar 15 09:56:38.125906 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:59.061828 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:57:20.128580 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:57:41.061944 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41146] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:02.045830 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:23.129129 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:44.129795 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:06.125831 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:27.129897 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:48.125869 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:09.033981 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:31.133812 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:52.127344 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:13.133828 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:34.129170 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:56.105893 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:17.131918 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:38.129846 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:59.121916 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:03:20.118393 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:03:41.033860 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:03.121811 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:25.141847 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:46.045953 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:07.137789 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:28.109800 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:50.133774 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:11.141794 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:33.129803 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:55.076680 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:16.129806 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:32.814923 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:35814] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abavFNSswJuvopo3lOjVSAAAAI0"]
[Sun Mar 15 10:07:37.046022 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:58.125778 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49518] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:08:19.049848 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:08:40.137788 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:01.057811 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:23.059868 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:44.130506 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:05.141789 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:26.133804 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:47.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:09.073892 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52168] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:30.133817 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:54.125909 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:55.791193 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:45518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abawG9SswJuvopo3lOjV7QAAAII"]
[Sun Mar 15 10:12:19.137807 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:12:40.038902 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:59546] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abawSHjZBu2q05ozVU_FXAAAAVQ"]
[Sun Mar 15 10:12:41.036526 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:02.118492 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:23.125869 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:44.072932 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:05.137906 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:26.121191 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:47.113830 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:08.137841 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:29.129819 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:50.129846 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:12.145896 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:33.133815 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:54.087958 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:15.121817 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:18.914717 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:60138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaxXnjZBu2q05ozVU_GJAAAAUM"]
[Sun Mar 15 10:17:40.122456 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:58.054770 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.228.16:60296] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaxhnjZBu2q05ozVU_GQwAAAU8"]
[Sun Mar 15 10:18:02.133890 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:18:24.125786 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:18:45.121804 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:06.137800 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:27.125886 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:48.134281 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:09.045807 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:30.126754 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:51.080490 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:12.161867 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:34.121766 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:55.134675 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:22:16.120278 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:22:29.895219 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:49540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaylZqj1wV0Si-OkedOYQAAABA"]
[Sun Mar 15 10:22:37.129803 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:01.127825 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:12.038726 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.228.16:45958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaywNSswJuvopo3lOjX0wAAAIM"]
[Sun Mar 15 10:23:22.129825 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:45.121808 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:07.061891 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:28.137837 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:49.685858 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:11.125983 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:32.101891 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:53.135732 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:15.125835 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:37.133800 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:58.129791 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:27:19.066536 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:27:40.135254 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:00.523903 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:33608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaz4Jqj1wV0Si-OkedPPAAAABc"]
[Sun Mar 15 10:28:01.121836 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:23.148410 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:34.639732 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:37156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba0AtSswJuvopo3lOjYkgAAAIw"]
[Sun Mar 15 10:28:45.153780 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:06.125841 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:29.125801 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38864] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:50.129839 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:11.135998 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:32.119128 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:53.141784 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:14.037840 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:35.126692 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:59.129807 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:32:20.134339 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:32:41.125844 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:02.125837 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:09.762088 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.244.31:36148] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba1FXjZBu2q05ozVU_IkwAAAU8"]
[Sun Mar 15 10:33:23.099935 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:38.879654 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:42502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba1MrABkC4fWIHEf8FewAAAAEY"]
[Sun Mar 15 10:33:44.124265 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:06.133781 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:28.129780 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:49.125829 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:11.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:32.132505 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:53.109909 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:14.125817 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:36.344355 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:58.125771 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:37:21.116168 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:37:42.129984 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45214] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:03.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:25.120673 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45728] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:31.955710 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:33186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba2V9SswJuvopo3lOjaGgAAAJM"]
[Sun Mar 15 10:38:47.383178 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:55.790104 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.228.16:47354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba2b3bQATo66fKoS7y6_AAAANI"]
[Sun Mar 15 10:39:09.122432 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:39:30.129846 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:39:52.105817 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:13.126825 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47160] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:34.113774 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:55.094444 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:16.071102 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:37.125771 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:59.110771 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:42:21.133873 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:42:45.124667 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:06.121962 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:27.137176 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:48.069824 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:02.506651 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:44016] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba3onbQATo66fKoS7y7sgAAAMo"]
[Sun Mar 15 10:44:09.125069 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:31.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:52.127366 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:53.803177 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.244.31:40250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba31XbQATo66fKoS7y71AAAANQ"]
[Sun Mar 15 10:45:14.120827 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:45:36.133773 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:45:57.126610 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:46:18.117839 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:46:39.141805 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:01.143922 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:22.153874 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:43.121280 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:07.120917 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:28.133832 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:49.037925 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:10.033950 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:23.645533 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:35068] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba449SswJuvopo3lOjblwAAAIU"]
[Sun Mar 15 10:49:31.117795 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53914] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:52.141793 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:05.638362 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.244.31:59376] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba5DHjZBu2q05ozVU_KswAAAUo"]
[Sun Mar 15 10:50:13.125795 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:35.129824 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:57.121807 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:51:18.069413 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:51:40.025803 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:01.057828 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:22.129793 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:43.129867 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56168] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:04.133950 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:26.125830 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:50.561832 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:12.098543 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:33.136560 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:34.440587 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.228.16:49206] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba6GnbQATo66fKoS7y9LwAAAM8"]
[Sun Mar 15 10:54:54.125857 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:15.122099 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:24.284550 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:53208] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba6THbQATo66fKoS7y9UAAAANc"]
[Sun Mar 15 10:55:36.126042 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:57.143320 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:56:18.133785 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:56:39.121778 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:02.126454 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:23.126024 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:44.129824 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59584] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:05.133839 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:26.125847 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:48.133878 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:10.129794 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:33.129785 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:54.661813 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:00:16.137770 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:00:26.614675 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:32768] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba7ebABkC4fWIHEf8FiywAAAFY"]
[Sun Mar 15 11:00:38.125823 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:00.133843 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:22.121922 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:44.136247 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:06.102246 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:27.578137 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:49.133817 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:10.126584 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:31.133775 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:53.125811 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:14.077939 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:35.097821 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:56.129828 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:05:17.125793 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:05:39.062833 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:00.129809 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:22.146690 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:43.065815 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:06.129825 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:27.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:48.126975 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:10.081818 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:31.117808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:52.117830 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:15.129906 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:36.045874 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:57.133826 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:10:18.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:10:30.634813 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.228.16:48114] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba91nbQATo66fKoS7zALAAAANY"]
[Sun Mar 15 11:10:39.120792 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:00.141826 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:22.133795 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:43.133772 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:05.125884 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:33.131957 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:55.125906 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:13:16.085850 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:13:39.129975 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:00.129779 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:22.125779 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:43.033841 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:04.131308 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:25.067891 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:37.770567 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.228.16:58078] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba_CZqj1wV0Si-OkedW3wAAAAA"]
[Sun Mar 15 11:15:46.131029 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:07.151664 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:27.141169 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.244.31:33768] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba_OnbQATo66fKoS7zBJAAAAMI"]
[Sun Mar 15 11:16:28.132565 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:49.121800 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:10.084987 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:31.133766 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:54.039759 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:18:15.133800 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:18:38.033846 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:01.125796 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:22.091537 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:44.049920 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:05.127908 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:26.133846 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:47.120654 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:04.383176 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:43964] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbAT3bQATo66fKoS7zB3QAAANc"]
[Sun Mar 15 11:21:08.133805 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:29.125778 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:34.337447 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.244.31:54720] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbAbrABkC4fWIHEf8FmYgAAAE0"]
[Sun Mar 15 11:21:50.057866 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:11.153880 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:32.133779 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51974] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:53.125816 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:15.125790 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:36.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:59.079958 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:24:24.130103 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53404] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:24:47.133871 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:08.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:29.045892 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:50.853905 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:08.111232 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.228.16:37002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbBgHbQATo66fKoS7zCgwAAAMs"]
[Sun Mar 15 11:26:12.134105 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:34.045979 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:55.120246 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:00.632376 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.244.31:43376] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbBtHjZBu2q05ozVU_QuwAAAUw"]
[Sun Mar 15 11:27:16.120502 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:37.104640 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:58.129770 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:28:20.121807 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:28:41.137796 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:02.121897 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:23.137830 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:46.125944 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:08.045841 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:29.125796 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:50.135353 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:12.441859 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:29.086344 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:57572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbCwXbQATo66fKoS7zDOgAAAMU"]
[Sun Mar 15 11:31:34.129816 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:56.041914 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:10.754475 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:41696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbC6rABkC4fWIHEf8FnxAAAAEE"]
[Sun Mar 15 11:32:17.130953 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:38.117865 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:59.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:33:21.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:33:42.081819 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:03.045839 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:24.125807 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:45.129809 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:06.137811 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:30.145771 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:51.057872 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:12.121958 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:33.125806 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:40.178840 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:55526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbD-Jqj1wV0Si-OkedZvAAAAAg"]
[Sun Mar 15 11:36:55.057881 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:16.125784 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:38.149959 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:38.991530 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.244.31:35698] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbEMrABkC4fWIHEf8FoiAAAAEg"]
[Sun Mar 15 11:38:00.257815 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:38:22.053902 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:38:43.121909 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:04.153822 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:25.131394 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:46.982969 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:08.121822 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:29.133777 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:52.121199 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:13.125790 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:34.152291 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:55.134373 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:01.310600 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:48506] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbFOXjZBu2q05ozVU_SuQAAAUQ"]
[Sun Mar 15 11:42:16.137780 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:37.121846 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:42.352564 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.244.31:36920] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbFYnbQATo66fKoS7zE2wAAANY"]
[Sun Mar 15 11:42:59.094014 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:43:20.098203 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:43:43.112436 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:04.128912 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:29.117806 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:50.129827 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:12.133793 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:35.113832 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:57.054668 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:46:19.060005 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:46:40.211176 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:01.121794 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:09.949981 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:45734] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbGbdSswJuvopo3lOjkowAAAI0"]
[Sun Mar 15 11:47:22.130040 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:43.125940 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:04.338308 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:50462] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbGpHbQATo66fKoS7zFqAAAAMM"]
[Sun Mar 15 11:48:04.463959 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:26.129801 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:47.093856 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43344] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:08.060114 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:29.137502 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:50.082824 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:11.517854 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:33.137963 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:56.181890 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:51:19.095044 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:51:41.133851 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:02.121817 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:23.133856 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:38.494905 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:43866] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbHtpqj1wV0Si-Okedc5wAAAAg"]
[Sun Mar 15 11:52:44.121260 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:05.131926 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:05.570010 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:55426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbH0bABkC4fWIHEf8Fq6wAAAFE"]
[Sun Mar 15 11:53:26.134136 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:47.125986 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:08.097800 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:29.111729 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:50.041982 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:11.129943 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:32.130623 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:54.137826 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:56:17.149870 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:56:39.121825 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:02.033896 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:23.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:44.125778 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:05.125780 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:26.122136 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:35.546814 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:41810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbJG9SswJuvopo3lOjmVwAAAIA"]
[Sun Mar 15 11:58:45.602476 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:58676] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbJJbABkC4fWIHEf8Fr7AAAAE4"]
[Sun Mar 15 11:58:48.121051 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:10.125787 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:31.125864 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:53.135284 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:14.130741 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:35.121200 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:56.126983 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:01:17.121802 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:01:38.118714 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:01.129804 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:24.109935 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:45.133828 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:07.133804 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:28.121853 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:37.826997 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.244.31:51694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbKSXbQATo66fKoS7zH6wAAANU"]
[Sun Mar 15 12:03:50.124271 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:11.129787 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:32.117841 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:53.137946 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:14.137969 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:36.133847 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:39.163692 2026] [autoindex:error] [pid 21946:tid 140411624429312] [client 167.172.93.181:54804] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive, referer: binance.com
[Sun Mar 15 12:05:57.125912 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:06:18.134036 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:06:39.125824 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:00.137785 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:23.138363 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:45.445855 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:07.137837 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:28.168043 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:49.125832 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:11.127427 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:32.113894 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:53.129936 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:14.041833 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:35.077935 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59620] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:57.095911 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:11:18.119695 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:11:39.129827 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:00.037826 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:22.132163 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:45.122093 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:07.106696 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:28.105813 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:50.125771 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:11.105900 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:27.859063 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:33094] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbM09SswJuvopo3lOjoZQAAAIY"]
[Sun Mar 15 12:14:32.133842 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:54.127245 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:15:17.453964 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:15:39.131820 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:01.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:22.057830 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:43.129776 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:04.129798 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:25.121850 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:47.101783 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] [client 179.188.53.243:36698] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:17:47.101828 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:36698] AH01075: Error dispatching request to : 
[Sun Mar 15 12:18:08.133809 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:18:29.097968 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:18:51.124672 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:12.129774 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:33.126906 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:34.324009 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.244.31:36610] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbOBnbQATo66fKoS7zKPAAAAMc"]
[Sun Mar 15 12:19:54.121783 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:54.403426 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:58788] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbOGrABkC4fWIHEf8FvIAAAAFc"]
[Sun Mar 15 12:20:15.126536 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:20:38.126140 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:00.129888 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:22.133776 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:43.121857 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:04.033818 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:25.126566 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:47.106172 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] [client 179.188.53.243:40780] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:22:47.106224 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:40780] AH01075: Error dispatching request to : 
[Sun Mar 15 12:23:09.141905 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:23:31.129827 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:23:52.121802 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:13.121803 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:35.125852 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:40.313756 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:46386] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbPONSswJuvopo3lOjqLQAAAIY"]
[Sun Mar 15 12:24:56.137815 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:17.141801 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:38.127523 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:59.130774 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:26:06.979976 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:60502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbPjtSswJuvopo3lOjqWQAAAJE"]
[Sun Mar 15 12:26:21.267589 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:26:43.049816 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:04.121802 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:25.125024 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:46.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:08.085880 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:30.033911 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:53.085884 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:14.045832 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:35.133801 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:56.137807 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:30:11.090412 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.244.31:35830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbQgXbQATo66fKoS7zMSwAAAM4"]
[Sun Mar 15 12:30:18.125821 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:30:39.053808 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:02.141833 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:10.804440 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:41648] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbQvnjZBu2q05ozVU_ZngAAAUg"]
[Sun Mar 15 12:31:23.121844 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:44.133837 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:05.097827 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:26.117852 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:54.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:33:15.069873 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:35:18.582178 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:33892] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbRtpqj1wV0Si-OkedkOgAAABE"]
[Sun Mar 15 12:35:45.126912 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:36:07.119152 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] [client 179.188.53.243:51668] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:36:07.119189 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:51668] AH01075: Error dispatching request to : 
[Sun Mar 15 12:36:28.125849 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:36:28.585235 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:58684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbR_HjZBu2q05ozVU_aTQAAAUw"]
[Sun Mar 15 12:36:49.133813 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:10.085807 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:31.121814 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:53.121836 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:14.122031 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:35.069830 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:56.125871 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:17.065814 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:38.137780 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:59.122092 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:20.069887 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:41.153833 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:46.954579 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.244.31:51418] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbS_nbQATo66fKoS7zNkQAAANY"]
[Sun Mar 15 12:41:03.057829 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:41:25.131783 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:41:42.455589 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:51576] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbTNtSswJuvopo3lOjsgwAAAJM"]
[Sun Mar 15 12:41:46.141766 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:07.142569 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:28.057813 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:49.125814 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:10.069842 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:31.125842 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:54.101781 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:15.134705 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:36.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:57.041837 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:18.041799 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:39.048182 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:49.194463 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:56704] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbULbABkC4fWIHEf8FyiwAAAEs"]
[Sun Mar 15 12:46:03.125809 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:28.329807 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:50.125827 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:56.962750 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.228.16:52586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbUcNSswJuvopo3lOjtTwAAAJQ"]
[Sun Mar 15 12:47:11.131070 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:47:32.121864 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:47:53.144714 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:14.167917 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:35.130291 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:56.129780 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:49:17.121858 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:49:38.065878 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:00.145800 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:22.345791 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:44.121335 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:06.121821 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:13.963358 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:45348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbVcbABkC4fWIHEf8FzLwAAAE4"]
[Sun Mar 15 12:51:27.122223 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:49.123204 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:11.021817 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:12.589196 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:32832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbVrHbQATo66fKoS7zPOwAAAMo"]
[Sun Mar 15 12:52:33.041813 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:54.089928 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:15.121881 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:36.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:57.124479 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:54:19.118509 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:54:41.138156 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:02.173802 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:23.041793 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:44.121788 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:06.102788 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:24.738145 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.244.31:34486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbWqHbQATo66fKoS7zP5wAAANU"]
[Sun Mar 15 12:56:27.129570 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:48.069827 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:11.122380 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:28.529833 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:40012] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbW6HbQATo66fKoS7zQAgAAANc"]
[Sun Mar 15 12:57:32.069831 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:53.057858 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:14.122789 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:36.135807 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:58.129798 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:59:19.131274 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:59:40.150293 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:01.126966 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:23.128232 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:44.125792 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:06.129787 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:28.118013 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:43.853405 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:34190] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbX59SswJuvopo3lOjvGwAAAIo"]
[Sun Mar 15 13:01:49.053843 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:11.122757 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:33.121830 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:55.124591 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:16.145806 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:37.137910 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:39.465829 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:56800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbYW7ABkC4fWIHEf8F0yAAAAFc"]
[Sun Mar 15 13:03:58.118163 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:04:19.121803 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:04:40.119497 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:01.137806 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:23.117820 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:44.032165 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:05.134119 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:27.145808 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:48.131330 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:54.921343 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.244.31:59496] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbZHrABkC4fWIHEf8F1EwAAAEc"]
[Sun Mar 15 13:07:10.131245 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:07:32.121934 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:07:56.341851 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:08:18.070374 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46726] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:08:39.105845 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:01.099995 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:22.117814 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:43.129854 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:04.137917 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:25.825812 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:48.257781 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:09.033925 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:30.121847 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:51.139744 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:12.130253 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:33.057901 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:54.125770 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:13:16.132190 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:13:37.033856 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:00.049803 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:23.069843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:44.129816 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:05.121687 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:26.119246 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:47.129778 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:10.126498 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:31.045841 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:52.137768 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:13.133782 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:34.121857 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:56.061861 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:18:18.126871 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:18:39.117817 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:00.135864 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:12.331231 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.228.16:58458] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbb_5qj1wV0Si-OkedqMQAAABA"]
[Sun Mar 15 13:19:21.121788 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:44.129033 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:06.123074 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:27.449799 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:49.037877 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:10.090955 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:31.129895 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:53.121806 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:20.141864 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:41.137999 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:51.386758 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:59446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbc29SswJuvopo3lOjxXAAAAIY"]
[Sun Mar 15 13:23:02.144939 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:23:24.126730 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:23:45.111090 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:06.127184 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:27.126076 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:28.205939 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.228.16:35170] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbdPHbQATo66fKoS7zTAAAAANM"]
[Sun Mar 15 13:24:49.117822 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:11.108541 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:32.169868 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:54.129777 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:15.113690 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:36.125198 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:57.129830 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:18.121774 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:39.130957 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:58.427848 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:44764] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbeDnjZBu2q05ozVU_gTgAAAUY"]
[Sun Mar 15 13:28:02.128440 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:28:24.045858 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:28:46.082350 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:07.122149 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:28.122149 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:35.235738 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:54094] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbeb3bQATo66fKoS7zT0gAAAMA"]
[Sun Mar 15 13:29:49.129873 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:10.121984 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:33.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:54.066005 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:16.230177 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:37.497225 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:59.123302 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:20.126860 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:41.125771 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:57.448387 2026] [access_compat:error] [pid 21946:tid 140411666392832] [client 4.239.241.168:60712] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:32:57.728915 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 4.239.241.168:57680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:33:02.138321 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:33:23.129807 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:33:23.983539 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:34656] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbfU7ABkC4fWIHEf8F4ywAAAEI"]
[Sun Mar 15 13:33:45.122817 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:08.105825 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:29.668820 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:51.121894 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:04.867482 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.228.16:57602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbfuHjZBu2q05ozVU_hPQAAAVI"]
[Sun Mar 15 13:35:12.121775 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:34.129225 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:55.149806 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:36:17.780977 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:36:39.122230 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:00.131677 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:21.049828 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:27.734193 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 4.239.241.168:61439] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:37:28.145430 2026] [access_compat:error] [pid 21533:tid 140411683178240] [client 4.239.241.168:60922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:37:42.058090 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:05.117784 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:28.129806 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:28.567261 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.244.31:35514] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbghHjZBu2q05ozVU_hvAAAAVI"]
[Sun Mar 15 13:38:49.057769 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:11.049927 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:29.485132 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 4.239.241.168:53832] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:29.743886 2026] [access_compat:error] [pid 11972:tid 140411624429312] [client 4.239.241.168:34454] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:33.422789 2026] [access_compat:error] [pid 21805:tid 140411741927168] [client 4.239.241.168:53832] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:33.451280 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:35.107312 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 4.239.241.168:34512] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:55.093876 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:40:10.615894 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.228.16:42108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbg6nbQATo66fKoS7zVnAAAAMs"]
[Sun Mar 15 13:40:16.125896 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:40:38.121781 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:41:00.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:41:30.121807 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:01.157795 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37258] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:25.112779 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:46.045996 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:07.133848 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:28.125897 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:52.121975 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:54.547622 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:42072] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbhytSswJuvopo3lOj0fgAAAIo"]
[Sun Mar 15 13:44:14.693811 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:44:37.117863 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:44:59.133801 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:45:21.104094 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:45:30.926298 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:36168] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbiKnjZBu2q05ozVU_ivQAAAVA"]
[Sun Mar 15 13:45:42.712554 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:04.121250 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:26.129768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:51.093180 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:47:22.125793 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:47:50.126289 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:11.121828 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:32.127330 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:54.122483 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:03.240743 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.244.31:35060] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbi_7ABkC4fWIHEf8F6vQAAAEQ"]
[Sun Mar 15 13:49:16.045841 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:37.133841 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:58.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:50:20.045800 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:50:42.834848 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:57708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbjYrABkC4fWIHEf8F62AAAAEk"]
[Sun Mar 15 13:50:43.155618 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:04.125794 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:25.127978 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:46.125780 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:52:12.033909 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:52:40.125813 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:09.125821 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:32.125819 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:55.122555 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:16.129837 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:20.446892 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:53462] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbkPNSswJuvopo3lOj1iQAAAJg"]
[Sun Mar 15 13:54:38.125809 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:59.125859 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44536] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:55:20.132065 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:55:42.123211 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:06.081881 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:09.315262 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:35496] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbkqbABkC4fWIHEf8F7lgAAAEs"]
[Sun Mar 15 13:56:27.126897 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:48.107659 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:57:10.121837 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:57:34.127043 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45540] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:02.033890 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:30.114685 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:54.121916 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:59:17.161793 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:59:30.238403 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:47368] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abblctSswJuvopo3lOj2VAAAAIM"]
[Sun Mar 15 13:59:39.125833 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:00.131302 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:21.129796 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:42.902154 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:04.125802 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:13.806147 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:39960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbl2dSswJuvopo3lOj2jAAAAIQ"]
[Sun Mar 15 14:01:28.049887 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:50.131429 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:11.057830 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:33.033879 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:55.125811 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:03:16.119445 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:03:52.121803 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:16.049870 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:39.089801 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:50.183432 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.244.31:52780] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbmsnbQATo66fKoS7zYYQAAANM"]
[Sun Mar 15 14:05:00.274172 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 78.174.193.63:20518] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Sun Mar 15 14:05:01.129965 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:05:23.129817 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:05:44.127452 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:05.057996 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:26.129672 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:32.119021 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:42128] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbnGLABkC4fWIHEf8F82QAAAEY"]
[Sun Mar 15 14:06:48.132195 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:09.126114 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:30.127793 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:52.132487 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:13.121992 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:34.133833 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:55.125134 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:17.125785 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:39.133789 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:52.657544 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.244.31:40400] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbn4LABkC4fWIHEf8F9LwAAAEg"]
[Sun Mar 15 14:10:00.122920 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:10:24.050162 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:10:46.129815 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:07.057823 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:28.124754 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:49.121859 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:11.337815 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:33.125805 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:54.071674 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:15.125810 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:36.122641 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:57.128427 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:14:18.046172 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:14:39.130848 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:00.141819 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:22.069841 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:46.121876 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:08.141818 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:30.129860 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:51.121816 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:17:32.121814 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:01.121794 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:22.122754 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:43.133822 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:05.141771 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:27.033822 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:48.144284 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:09.125807 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:30.141794 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:52.120864 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:13.128506 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:34.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:56.125836 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:22:17.149799 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:22:18.244908 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:55338] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbqypqj1wV0Si-Okedy6QAAAAo"]
[Sun Mar 15 14:22:53.324274 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:23:15.107108 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:23:44.121805 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:05.136278 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:27.121806 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:48.140826 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:09.129784 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:32.117826 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:43.692610 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:41458] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbrl7ABkC4fWIHEf8F-0QAAAFc"]
[Sun Mar 15 14:25:54.125792 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:16.126124 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:37.123385 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:58.089854 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:27:20.117796 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:27:41.761684 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:55620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbsDZqj1wV0Si-Okedz3wAAAAg"]
[Sun Mar 15 14:27:42.557487 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:28:09.134076 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:28:37.117815 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:06.161914 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:27.109486 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:48.096371 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:09.045813 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:33.129773 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:44.435256 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:51984] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbsxJqj1wV0Si-Oked0PQAAABA"]
[Sun Mar 15 14:30:55.125808 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:31:16.125552 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:31:37.070211 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:00.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:22.041823 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:43.124197 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:47.046632 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:50018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbtP7ABkC4fWIHEf8F_fAAAAE4"]
[Sun Mar 15 14:33:04.124401 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:33:32.125925 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:33:59.125843 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:34:28.145915 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:34:49.118455 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:10.254534 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:31.123997 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:54.133472 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:36:18.113228 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:36:19.504277 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:35426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbuE5qj1wV0Si-Oked1GgAAABg"]
[Sun Mar 15 14:36:39.121249 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:00.121807 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:21.125837 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:44.124136 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:05.033947 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:10.703089 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:33442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbugtSswJuvopo3lOj6OgAAAIQ"]
[Sun Mar 15 14:38:26.132561 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:48.135169 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:39:21.129981 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:39:49.149787 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:11.073849 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:33.121817 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:54.133804 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:41:16.125909 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:41:38.125183 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:00.069827 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:23.121780 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:24.759534 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:42218] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbvgLABkC4fWIHEf8GALgAAAFU"]
[Sun Mar 15 14:42:45.062063 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:07.137803 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:16.409071 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:34320] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbvtLABkC4fWIHEf8GARQAAAFg"]
[Sun Mar 15 14:43:28.129769 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:50.127790 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:44:12.130284 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:44:43.033952 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:10.129914 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:33.126923 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:55.139334 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:46:17.121784 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:46:27.641170 2026] [mime_magic:error] [pid 11972:tid 140411733534464] (70014)End of file found: [client 66.249.74.169:44097] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 14:46:38.077836 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:01.130062 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:23.061848 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:45.130788 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:06.138287 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:27.097835 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:33.108785 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:36666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbw8XjZBu2q05ozVU_o4wAAAUQ"]
[Sun Mar 15 14:48:34.144390 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:37914] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbw8pqj1wV0Si-Oked2YgAAABg"]
[Sun Mar 15 14:48:54.127799 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:49:20.045850 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:49:41.134130 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:02.154836 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:32.129899 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:55.129848 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:16.120585 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:37.129765 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:58.131567 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:52:20.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:52:30.751879 2026] [core:alert] [pid 21805:tid 140411624429312] [client 66.249.74.169:45539] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 14:52:41.125899 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:02.133838 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:23.125519 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:39.290716 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.244.31:33056] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbyI3bQATo66fKoS7zdKgAAAMA"]
[Sun Mar 15 14:53:44.127563 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:44.713160 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:46816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbyKNSswJuvopo3lOj7aQAAAI8"]
[Sun Mar 15 14:54:05.141828 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:54:27.133814 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:54:48.127648 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:10.137808 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:31.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:54.125768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:56:17.124748 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:56:38.152259 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:00.135845 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:22.061950 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:44.131282 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:05.141890 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:27.129817 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:48.069982 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:04.315627 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:37478] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbzaLABkC4fWIHEf8GBgAAAAEM"]
[Sun Mar 15 14:59:09.129859 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:10.513060 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:53756] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbzbtSswJuvopo3lOj8BQAAAI4"]
[Sun Mar 15 14:59:30.125825 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:51.045810 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:13.058996 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:34.138679 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:55.144039 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:01:17.121832 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:01:39.129823 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:00.078396 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:22.044139 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:44.121868 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:05.713830 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:27.123430 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:49.133859 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:08.782832 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:54730] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb0mLABkC4fWIHEf8GB-QAAAE4"]
[Sun Mar 15 15:04:10.056304 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:31.069884 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:52.129926 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:13.121782 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:22.665553 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:41798] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb04rABkC4fWIHEf8GCQAAAAEs"]
[Sun Mar 15 15:05:34.081892 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:56.125771 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:17.129848 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:38.045952 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:59.045857 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:07:20.122993 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:07:42.133891 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:04.141454 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:25.857090 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:47.122076 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56140] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:08.129858 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:31.745859 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:31.978996 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:38444] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb125qj1wV0Si-Oked4ZQAAABU"]
[Sun Mar 15 15:09:53.137630 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:14.130276 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:30.606957 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.228.16:54122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb2FtSswJuvopo3lOj9EAAAAIs"]
[Sun Mar 15 15:10:35.133799 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:57.105919 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:11:18.120357 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:11:39.590180 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:01.120359 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:22.129811 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:43.041934 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:05.121791 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:26.088996 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:47.129858 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:09.075436 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:31.141781 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:41.603917 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:46388] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb3EbABkC4fWIHEf8GDGwAAAFU"]
[Sun Mar 15 15:14:53.065894 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:14.133807 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:36.119463 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:57.069661 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:16:18.134224 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:16:39.121835 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:00.121464 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:21.137789 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:42.133820 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:03.081803 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:25.138579 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:46.140387 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:08.141822 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:30.125906 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:55.124987 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:17.071047 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:29.540261 2026] [core:alert] [pid 11972:tid 140411683178240] [client 66.249.74.169:50689] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 15:20:38.123720 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:59.137093 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:21:20.261830 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:21:41.128835 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:03.069874 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:24.128365 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:45.118513 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:06.124210 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:28.129894 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:49.133772 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:10.053065 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:31.057901 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:52.045852 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:25:17.133816 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:25:39.126504 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:00.134910 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:07.538509 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.244.31:50554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb5v5qj1wV0Si-Oked6UAAAAAg"]
[Sun Mar 15 15:26:16.457296 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.228.16:55942] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb5yHbQATo66fKoS7zg1wAAANE"]
[Sun Mar 15 15:26:23.133833 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36974] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:44.129896 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:05.119983 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:32.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:53.125810 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:14.061859 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:36.072844 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:57.129204 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:29:18.125786 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:29:39.121717 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:00.137846 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:21.129071 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:42.126601 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:03.128304 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:13.909831 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.244.31:50664] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb68XbQATo66fKoS7zhhQAAANA"]
[Sun Mar 15 15:31:20.091812 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:51218] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb6-HjZBu2q05ozVU_swwAAAUg"]
[Sun Mar 15 15:31:24.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:45.137770 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:07.129806 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:29.045828 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:54.042007 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:33:16.129774 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:33:38.129860 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:00.141862 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:22.133837 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:43.131293 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:04.132546 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:26.133779 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:47.021817 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:08.129814 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:29.133372 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:32.010050 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:47170] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb8MHjZBu2q05ozVU_tWAAAAUM"]
[Sun Mar 15 15:36:43.279568 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.228.16:55156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb8O9SswJuvopo3lOj_wAAAAIg"]
[Sun Mar 15 15:36:50.129855 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:11.129790 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:33.121929 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:54.137814 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:38:16.081837 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:38:38.125784 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:01.129826 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:23.122007 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:44.139582 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:05.153774 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:27.127885 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:48.134654 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:09.129910 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:30.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:52.045945 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:55.652429 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.228.16:45836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb9c3bQATo66fKoS7zitwAAAMg"]
[Sun Mar 15 15:42:14.113970 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:42:35.122235 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:42:37.578939 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:59004] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb9nZqj1wV0Si-Oked8OgAAABg"]
[Sun Mar 15 15:42:57.262079 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:43:18.120972 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:43:39.125862 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:01.125854 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:23.137817 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:46.133899 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:07.042820 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:28.129848 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:50.134926 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:11.129897 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:32.148692 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:54.122018 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:15.129831 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:18.270254 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:48196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb-trABkC4fWIHEf8GGNQAAAFE"]
[Sun Mar 15 15:47:36.129896 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:57.127755 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:48:18.113847 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:48:40.100398 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:02.138349 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:23.129830 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:45.125837 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:11.129808 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:33.081977 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51124] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:55.157805 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:16.130025 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:37.133812 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:58.045909 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:52:19.208572 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.228.16:35296] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb_45qj1wV0Si-Oked9ZAAAAA0"]
[Sun Mar 15 15:52:20.130384 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:52:41.126510 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:02.132009 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:05.034963 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:57446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcAEXjZBu2q05ozVU_vcgAAAUk"]
[Sun Mar 15 15:53:23.133909 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:44.123217 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:10.085910 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:31.137865 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:53.129820 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:14.133860 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:35.129843 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:56.125811 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:56:18.125872 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:56:40.128122 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:01.105822 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:22.129783 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:44.112923 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:47.254957 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:41424] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcBK7ABkC4fWIHEf8GHXgAAAE8"]
[Sun Mar 15 15:58:05.057895 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:58:09.728225 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:39240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcBQZqj1wV0Si-Oked-FQAAABU"]
[Sun Mar 15 15:58:26.085829 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:58:47.117876 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55620] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:08.127817 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:32.111008 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:54.053943 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:15.069825 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:37.833846 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:59.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:01:20.029903 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:01:41.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:02.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:23.117601 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:44.129786 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:05.129824 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:26.125859 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:35.305499 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:57600] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcCh9SswJuvopo3lOgCvgAAAIU"]
[Sun Mar 15 16:03:48.129765 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:00.259212 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.228.16:35274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcCoHjZBu2q05ozVU_wtwAAAU4"]
[Sun Mar 15 16:04:09.141779 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:30.133243 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:51.074015 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:05:16.129780 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:05:38.057910 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:00.129875 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:21.144318 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:42.122093 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:03.133848 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:25.129831 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:46.122993 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:08.096141 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:34.093570 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:32902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:37.408196 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.244.31:54770] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcDtdSswJuvopo3lOgDZAAAAJU"]
[Sun Mar 15 16:08:55.122138 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:07.475886 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:38196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcD03jZBu2q05ozVU_xTgAAAVE"]
[Sun Mar 15 16:09:16.137788 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:37.083103 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:59.122079 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:10:21.116912 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:10:43.173820 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:11:22.129899 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:11:44.121657 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:06.125787 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:27.122128 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:48.125798 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:10.121787 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:31.141871 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:55.121896 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:06.534021 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:44750] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcE_nbQATo66fKoS7znIQAAAMQ"]
[Sun Mar 15 16:14:17.133808 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:29.408567 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.228.16:56906] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcFFdSswJuvopo3lOgEBgAAAJA"]
[Sun Mar 15 16:14:38.133833 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:52.580001 2026] [:error] [pid 21946:tid 140411649607424] [client 87.121.84.71:35244] [client 87.121.84.71] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/plugins/jquery-file-upload/server/php/index.php"] [unique_id "abcFLHbQATo66fKoS7znQgAAAMs"]
[Sun Mar 15 16:14:59.134371 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:15:21.149800 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37074] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:15:44.130384 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:16:05.123864 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:16:29.129810 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:01.120302 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:29.121344 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:50.125780 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:12.147618 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:33.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:54.148327 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:19:07.552810 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:54034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcGK3jZBu2q05ozVU_zGAAAAVc"]
[Sun Mar 15 16:19:18.125808 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:19:40.126880 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:01.473565 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:23.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:44.119194 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:07.164716 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:29.137768 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:51.057850 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41540] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:22:23.046136 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:22:51.282559 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:13.129775 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:34.122476 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:55.132072 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:24:17.153779 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:24:41.129796 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:02.141855 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:24.130508 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:45.145932 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:06.121893 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:30.136279 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:51.129806 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:27:14.121262 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:27:45.053856 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:07.131885 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:35.126490 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:57.053867 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:18.121885 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:39.125825 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:42.849521 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.244.31:56520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcIppqj1wV0Si-OkeeDXQAAAAU"]
[Sun Mar 15 16:30:00.125792 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:30:11.923227 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:53838] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcIw3jZBu2q05ozVU_0kwAAAVU"]
[Sun Mar 15 16:30:24.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:30:47.165494 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:11.121811 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:33.111608 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:54.125819 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:32:15.137817 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:32:36.129816 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:06.126149 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:27.141793 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:57.122331 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:34:18.137814 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:34:40.129963 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:01.113936 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:05.589020 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.244.31:59758] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcJ6XbQATo66fKoS7zp2gAAANA"]
[Sun Mar 15 16:35:22.093897 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:37.711510 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.228.16:46342] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcKCXbQATo66fKoS7zp7QAAANM"]
[Sun Mar 15 16:35:45.129952 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:09.072908 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:30.129895 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:56.129911 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:17.132936 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:38.133771 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:59.144176 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:38:20.299918 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:38:43.123918 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:39:19.059909 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53500] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:39:40.118136 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:02.137864 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:23.137779 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:44.125827 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:08.137834 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:16.526483 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:58912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcLXNSswJuvopo3lOgHZAAAAIY"]
[Sun Mar 15 16:41:30.130194 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:45.453095 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:33704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcLedSswJuvopo3lOgHbgAAAJM"]
[Sun Mar 15 16:41:52.093823 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:42:19.157843 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:42:40.133817 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:01.121780 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:22.133786 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:44.115308 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:44:06.133803 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:44:42.069883 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:03.133789 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:24.125876 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:45.101304 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:06.123315 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:29.044072 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:35730] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcMlbABkC4fWIHEf8GNqwAAAFE"]
[Sun Mar 15 16:46:29.130462 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:51.133612 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58338] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:55.301242 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:53274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcMr7ABkC4fWIHEf8GNvwAAAEo"]
[Sun Mar 15 16:47:14.045908 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:47:41.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:03.125394 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:25.126570 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:46.793789 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:09.133772 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:30.033925 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:51.125815 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:50:25.125915 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:50:46.053846 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:07.125953 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:33.137810 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:43.852254 2026] [:error] [pid 21533:tid 140411666392832] [client 15.235.27.135:59634] [client 15.235.27.135] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcNznjZBu2q05ozVU_25wAAAUk"]
[Sun Mar 15 16:51:48.289279 2026] [:error] [pid 11972:tid 140411540502272] [client 51.161.37.83:59746] [client 51.161.37.83] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abcN1Jqj1wV0Si-OkeeGVwAAABg"]
[Sun Mar 15 16:51:54.121853 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:52:21.121886 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:52:25.655021 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.228.16:39562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcN-XbQATo66fKoS7zsJwAAAMM"]
[Sun Mar 15 16:52:43.057791 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:05.017828 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:26.125943 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:47.122693 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:08.133789 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:29.045840 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:50.121781 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:11.133778 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:32.057842 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:53.131295 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:14.141008 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:35.125834 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:56.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:57.290807 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:46816] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcPCdSswJuvopo3lOgJBAAAAJQ"]
[Sun Mar 15 16:57:17.125793 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:57:38.130905 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:00.097820 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37108] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:21.123982 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:34.806333 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:38122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcPatSswJuvopo3lOgJRgAAAI0"]
[Sun Mar 15 16:58:43.131350 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:04.129825 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:25.121240 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:47.137812 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:08.029140 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:29.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:50.142016 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:11.125895 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:32.121814 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:55.101864 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:15.946340 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:52786] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcQR5qj1wV0Si-OkeeIAQAAABE"]
[Sun Mar 15 17:02:16.125774 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:37.121852 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:59.125825 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:21.061238 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:42.129777 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:53.489698 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:54248] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcQqXbQATo66fKoS7ztiwAAAMQ"]
[Sun Mar 15 17:04:04.125827 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:04:26.121880 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:04:48.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:09.131390 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:30.025802 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:51.119673 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:12.125882 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:33.121812 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:54.124156 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:15.136437 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:22.813184 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:43618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcRenjZBu2q05ozVU_4wQAAAU0"]
[Sun Mar 15 17:07:36.057940 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:57.125953 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:08:18.121799 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:08:40.121796 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:01.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:19.795602 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.228.16:60852] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcR75qj1wV0Si-OkeeJFAAAAAs"]
[Sun Mar 15 17:09:23.114798 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:44.137850 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:06.403193 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:29.125680 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:56.053842 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:11:17.130277 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:11:39.045926 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:00.125512 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:21.129783 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:42.129793 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:51.437601 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.244.31:56646] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcSwwlT9VtDQc7bgUw21QAAARM"]
[Sun Mar 15 17:13:03.133816 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:13:26.136552 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:13:48.121785 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:09.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:21.788114 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:60632] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcTHbABkC4fWIHEf8GQ1QAAAEY"]
[Sun Mar 15 17:14:30.125886 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:51.118902 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:12.105835 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:33.129805 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:54.137802 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:15.073589 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:36.119226 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:57.021886 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:17:18.133789 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:17:39.100767 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:00.129560 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51082] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:00.533300 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:47560] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcT-LABkC4fWIHEf8GRMgAAAEE"]
[Sun Mar 15 17:18:21.021806 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:43.126781 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51502] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:05.129816 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:26.081948 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:43.058853 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:42502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcUX9SswJuvopo3lOgLmAAAAI4"]
[Sun Mar 15 17:19:47.105053 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:09.134014 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:30.137798 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52384] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:52.091845 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:13.142163 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:34.129777 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:55.125777 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:16.061818 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:37.033815 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:58.317779 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:23:20.122387 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:23:24.117769 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:38654] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcVPHbQATo66fKoS7zvPgAAAMk"]
[Sun Mar 15 17:23:43.069975 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:13.445883 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:35.123623 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54732] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:56.137072 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:25:18.138286 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:25:40.045853 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:02.045910 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:23.985822 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:45.049840 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:06.025845 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:27.123355 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:48.125788 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:09.121244 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:30.105588 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:51.049844 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:12.122174 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:35.128075 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:56.129795 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:30:18.126812 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:30:40.037848 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:02.125882 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:24.133800 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:45.133870 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:08.129888 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:30.133802 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:51.094853 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:12.125789 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:34.110671 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:51.078542 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.244.31:59882] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcXr3bQATo66fKoS7zwKgAAAMg"]
[Sun Mar 15 17:33:55.117916 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:34:12.725268 2026] [core:alert] [pid 21805:tid 140411607643904] [client 66.249.74.169:38228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 17:34:16.126793 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:34:38.033808 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:00.135692 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:08.024584 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:34928] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcX_AlT9VtDQc7bgUw57QAAARg"]
[Sun Mar 15 17:35:22.099987 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:43.121893 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:06.133831 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:27.125875 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:48.129804 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:10.137781 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32828] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:32.137329 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:54.121794 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:21.045899 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:47.120957 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:55.645349 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:44118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcY37ABkC4fWIHEf8GTLgAAAEY"]
[Sun Mar 15 17:39:08.125851 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:39:31.764924 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:39:53.141824 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:40:14.134770 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:40:25.478126 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:36106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcZObABkC4fWIHEf8GTcQAAAEM"]
[Sun Mar 15 17:40:40.121778 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:01.105839 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:23.125801 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:44.137181 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:05.135870 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:27.121200 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:48.133622 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:09.123624 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:31.137789 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:52.126096 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:12.130099 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.244.31:41304] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcaHHjZBu2q05ozVU_8sAAAAVY"]
[Sun Mar 15 17:44:13.033811 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:34.121824 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:56.045884 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:45:17.137781 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:45:28.768706 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.228.16:43280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcaaAlT9VtDQc7bgUw70gAAAQo"]
[Sun Mar 15 17:45:38.121908 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:02.114314 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:23.053923 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:44.133786 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:06.128770 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:28.117792 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:49.558878 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:12.129799 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:33.126510 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:55.133360 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:49:16.082193 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:49:17.289004 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.244.31:55652] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcbTZqj1wV0Si-OkeeNbQAAAAM"]
[Sun Mar 15 17:49:37.138258 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:00.154312 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:21.130172 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:42.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:55.974196 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:35734] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcbr9SswJuvopo3lOgPKAAAAJM"]
[Sun Mar 15 17:51:03.121784 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:51:24.129844 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:51:45.129087 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:06.161790 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:28.123394 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:50.125832 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:11.130229 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:35.139385 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:57.121215 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:54:18.135121 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:54:39.581815 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:55:01.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:56:06.242111 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:42544] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcc5pqj1wV0Si-OkeeOfgAAAAU"]
[Sun Mar 15 17:59:46.908534 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.244.31:36264] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcdwnbQATo66fKoS7zz_gAAAMY"]
[Sun Mar 15 18:00:02.251135 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 45.227.253.15:53010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:00:24.121874 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:00:46.125243 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:07.125843 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:28.122206 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:33.185796 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.228.16:47332] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abceLXjZBu2q05ozVU__AQAAAUk"]
[Sun Mar 15 18:01:49.129800 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:10.138095 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:32.080055 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52850] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:53.129812 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:14.134361 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:35.133812 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:56.138346 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:17.123023 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:38.122003 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54584] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:59.125850 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:05:10.971828 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:46484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcfBtSswJuvopo3lOgRQwAAAJc"]
[Sun Mar 15 18:05:22.681163 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:05:46.129832 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55490] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:09.126004 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:30.045817 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:42.760866 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:39036] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcfYglT9VtDQc7bgUw_YAAAAQY"]
[Sun Mar 15 18:06:52.125866 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:14.148804 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:35.033819 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:56.061812 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:08:17.137691 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:08:39.133845 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:00.149784 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:21.036820 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:42.145901 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:03.125822 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:21.994641 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.244.31:51430] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcgPdSswJuvopo3lOgSOAAAAJE"]
[Sun Mar 15 18:10:30.129785 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:52.149807 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:13.131470 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:34.045825 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:55.118214 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:12:08.086430 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.228.16:51746] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcgqAlT9VtDQc7bgUxAVAAAARQ"]
[Sun Mar 15 18:12:17.126621 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:12:38.066528 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:00.129791 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33850] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:21.125803 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:43.204902 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:04.130139 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:25.145996 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:47.125085 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:08.149913 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:30.205814 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:47.231235 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.244.31:47630] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abchg5qj1wV0Si-OkeeRogAAABY"]
[Sun Mar 15 18:15:52.045824 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:13.132137 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:34.133778 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:58.097892 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:17:14.848353 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:37034] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abch2tSswJuvopo3lOgS-wAAAI8"]
[Sun Mar 15 18:17:20.118407 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:17:46.097872 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:07.125816 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:25.561680 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:37702] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abciIbABkC4fWIHEf8GYugAAAEs"]
[Sun Mar 15 18:18:28.119264 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:49.129800 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:10.126557 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:31.117838 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:52.132260 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:13.141800 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40232] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:35.123781 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:55.895173 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.244.31:34524] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcit3jZBu2q05ozVU8BpwAAAUI"]
[Sun Mar 15 18:20:56.125786 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:14.667121 2026] [mime_magic:error] [pid 21946:tid 140411624429312] (70014)End of file found: [client 66.249.74.169:60428] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 18:21:17.057960 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:38.121811 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:59.137799 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:22:20.589801 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:22:38.275490 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:57414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcjHrABkC4fWIHEf8GZJgAAAEM"]
[Sun Mar 15 18:22:42.129794 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:09.124034 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:31.128058 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:52.131377 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:14.129846 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:35.125817 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:56.129797 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:25:16.558042 2026] [mime_magic:error] [pid 21806:tid 140411658000128] (70014)End of file found: [client 162.144.233.59:58332] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 18:25:18.077795 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:25:19.301916 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] [client 162.144.233.59:58434] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 18:25:40.117592 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:01.133769 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:19.048656 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.244.31:52776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcj-5qj1wV0Si-OkeeSsgAAAAg"]
[Sun Mar 15 18:26:26.125815 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:47.141793 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:08.132211 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:29.121699 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:51.153887 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:12.105811 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:33.053818 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:54.121277 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:29:21.057829 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:29:42.057857 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:03.125816 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:25.117821 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:47.076929 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:08.054185 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:31.125776 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:52.125813 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:59.011837 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 102.219.155.27:23922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Sun Mar 15 18:32:13.123793 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:32:34.070630 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:32:55.037823 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:17.133775 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:38.125967 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:59.073906 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:34:20.124067 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:34:44.121785 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:05.113633 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:27.045861 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:49.045830 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:10.129779 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:31.128490 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:43.019833 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:53994] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcma9SswJuvopo3lOgUtwAAAJY"]
[Sun Mar 15 18:36:53.121805 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:14.106054 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:36.069870 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:57.122102 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:38:15.570927 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:54152] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcmxwlT9VtDQc7bgUxDNwAAAQQ"]
[Sun Mar 15 18:38:19.037880 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:38:40.125821 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:01.137926 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:23.130296 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:45.123941 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:07.057917 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:28.120236 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:50.126922 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:11.123745 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:32.136519 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:46.991179 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:39468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcnmtSswJuvopo3lOgVEAAAAIE"]
[Sun Mar 15 18:41:54.135984 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:16.685816 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:38.121765 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:59.021787 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:43:20.137765 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:43:40.489445 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.228.16:35276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcoDHbQATo66fKoS7z5JwAAANY"]
[Sun Mar 15 18:43:41.121843 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:03.130743 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:24.809392 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:46.701834 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:08.041886 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:29.129779 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:51.125287 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:12.137788 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:33.124528 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:54.081792 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:47:13.109414 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:54474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abco4dSswJuvopo3lOgVqQAAAIM"]
[Sun Mar 15 18:47:16.129792 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:47:38.033873 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:00.129785 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:21.041823 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:43.070578 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:53.004936 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:41304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcpRZqj1wV0Si-OkeeU9gAAAA4"]
[Sun Mar 15 18:49:05.141461 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:49:27.133873 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:49:49.121842 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:11.097870 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:32.033891 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:54.085861 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:15.041800 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:36.121783 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:58.125792 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:52:13.493238 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:46128] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcqDZqj1wV0Si-OkeeVRQAAABE"]
[Sun Mar 15 18:52:19.131142 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:52:40.509891 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:03.133807 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:24.127248 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:45.125875 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:06.065905 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:32776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:13.003160 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.228.16:39988] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcqhZqj1wV0Si-OkeeVZwAAAAQ"]
[Sun Mar 15 18:54:27.133815 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:49.065871 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:11.131912 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:33.125823 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:55.081807 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:56:17.137814 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34082] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:56:39.037809 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:00.141986 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:21.129865 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:49.137424 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:10.037832 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:31.125804 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:53.129798 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:14.130106 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:19.529123 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.228.16:47010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcrt3bQATo66fKoS7z6ZAAAANg"]
[Sun Mar 15 18:59:35.133817 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:56.122262 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:00:17.050059 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:00:27.068468 2026] [mime_magic:error] [pid 32654:tid 140411658000128] (70014)End of file found: [client 66.249.74.169:54254] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 19:00:38.133788 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:00.130521 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:21.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:43.102447 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:05.120972 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:27.129826 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:48.120324 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:10.121450 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:32.045878 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:54.069827 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:56.951043 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:39040] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcszHjZBu2q05ozVU8FJwAAAVc"]
[Sun Mar 15 19:04:16.125936 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:04:37.125802 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:04:46.600846 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:38992] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcs_njZBu2q05ozVU8FOgAAAU0"]
[Sun Mar 15 19:04:58.141407 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:05:19.130793 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:05:41.129783 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:03.122010 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:25.113811 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:46.129887 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:07.131303 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40376] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:29.129861 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:50.138858 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:12.482784 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:34.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:55.133998 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:58.346197 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:57256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abct-nbQATo66fKoS7z7LgAAAMM"]
[Sun Mar 15 19:09:17.045803 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:09:38.057820 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:09:49.950367 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:50946] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcuLXjZBu2q05ozVU8FnwAAAU0"]
[Sun Mar 15 19:09:59.113845 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:10:20.129892 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:10:41.057811 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:03.057836 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:26.113985 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:48.126542 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:10.130108 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:31.125793 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:53.126791 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:15.133850 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:36.121764 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:57.129790 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:14:18.122766 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:14:21.815085 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:47408] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcvPXjZBu2q05ozVU8GKQAAAU0"]
[Sun Mar 15 19:14:40.125826 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:01.122654 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:11.341156 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.228.16:32820] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcvbwlT9VtDQc7bgUxG6QAAARQ"]
[Sun Mar 15 19:15:22.121773 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:43.110457 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:04.127146 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:25.581798 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:47.125795 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:11.109327 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:32.129366 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:55.277779 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:18:17.033951 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:18:39.093864 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:00.129816 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:21.045939 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:28.267018 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:34968] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcwcAlT9VtDQc7bgUxHjgAAAQs"]
[Sun Mar 15 19:19:42.140558 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:03.133804 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:16.651041 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.228.16:58566] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcwoAlT9VtDQc7bgUxHqAAAAQE"]
[Sun Mar 15 19:20:24.137801 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:47.109129 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:08.117929 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:29.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:51.126659 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:14.317863 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:37.141863 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:59.098619 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:23:21.119557 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:23:42.145861 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:03.045849 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:25.119967 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:46.129824 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:56.887577 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:41886] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcxuHbQATo66fKoS7z9GwAAAMs"]
[Sun Mar 15 19:25:08.777891 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:25:30.045886 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:25:44.127483 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.228.16:36590] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcx6LABkC4fWIHEf8GeiAAAAE0"]
[Sun Mar 15 19:25:51.125801 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:12.130485 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:33.131476 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:55.118984 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:16.125850 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:37.141795 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:59.122261 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:28:21.125835 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:28:44.117840 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:07.145765 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:28.121998 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:49.137872 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:00.823101 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:37406] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcy6Jqj1wV0Si-OkeeZPQAAABc"]
[Sun Mar 15 19:30:10.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:31.121903 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:53.121822 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:14.078162 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:35.129824 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:57.126060 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:32:19.777765 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:32:41.123187 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:02.129995 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:24.119822 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58570] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:45.129907 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:07.077445 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:29.449849 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:51.133794 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:12.130099 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:34.129782 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:55.037810 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:36:16.133884 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:36:37.128633 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:00.124093 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:22.117808 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:43.134131 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33156] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:09.129781 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:30.053845 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:51.125838 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:12.129777 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:33.069837 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:35.511499 2026] [core:alert] [pid 32654:tid 140411548894976] [client 66.249.74.169:52532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 19:39:54.119598 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:40:20.069875 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:40:40.560685 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:55806] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc1aHjZBu2q05ozVU8I7QAAAUk"]
[Sun Mar 15 19:40:42.130295 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:03.126452 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:19.623326 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.228.16:51238] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc1j5qj1wV0Si-OkeeaVwAAABE"]
[Sun Mar 15 19:41:24.037818 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:45.129831 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:07.069921 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:29.129812 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:50.126158 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:11.133813 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36502] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:32.133831 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:55.068052 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:16.117785 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:37.021807 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:59.129844 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:45:20.053852 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:45:42.057836 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:02.083489 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:53200] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc2qrABkC4fWIHEf8GgRAAAAFA"]
[Sun Mar 15 19:46:04.070887 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:25.133859 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:36.526633 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:41276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc2zHbQATo66fKoS7z_AAAAANc"]
[Sun Mar 15 19:46:46.033816 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:07.126320 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:30.069905 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:51.145742 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:12.140122 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:33.061931 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:55.125837 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:16.129876 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:38.126588 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:59.121800 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:50:21.125781 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:50:43.090992 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:07.133818 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:14.344469 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.244.31:35428] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc34nbQATo66fKoS7z_ZgAAAM4"]
[Sun Mar 15 19:51:28.125914 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:46.184162 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:52666] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc4Apqj1wV0Si-OkeebSQAAAAo"]
[Sun Mar 15 19:51:49.129808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:10.098460 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:32.130106 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:53.121203 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:14.128394 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:36.135695 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:57.120988 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42568] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:54:18.124360 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:54:39.125789 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:00.141837 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:22.761447 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:44.122218 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:05.119985 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:29.133843 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:40.739246 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.244.31:48880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc5KAlT9VtDQc7bgUxLngAAAQ8"]
[Sun Mar 15 19:56:51.130811 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:12.125800 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:13.707161 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:35602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc5SXjZBu2q05ozVU8KlgAAAUE"]
[Sun Mar 15 19:57:34.139755 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:56.125812 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:58:18.110891 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:58:39.117827 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:02.617811 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:24.220997 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:45.133796 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:06.135966 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:28.127435 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:49.125813 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:10.131373 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:31.125798 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:52.126805 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:14.121802 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:22.724784 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.228.16:36862] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc6fnbQATo66fKoS7wApgAAAMk"]
[Sun Mar 15 20:02:37.125829 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:58.064537 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:03:19.073051 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:03:40.069836 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49732] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:02.154725 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:24.104654 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:46.029820 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:07.133787 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:28.088742 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:50.126228 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:08.544210 2026] [access_compat:error] [pid 21946:tid 140411582465792] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 20:06:10.952728 2026] [access_compat:error] [pid 21806:tid 140411725141760] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.170730 2026] [access_compat:error] [pid 21946:tid 140411632822016] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.387920 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.606292 2026] [access_compat:error] [pid 21946:tid 140411741927168] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 20:06:11.821337 2026] [access_compat:error] [pid 21806:tid 140411708356352] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:12.038892 2026] [access_compat:error] [pid 21946:tid 140411624429312] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 20:06:12.122262 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:33.736962 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:55.033855 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:16.082372 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:17.122900 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:54312] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc7pbABkC4fWIHEf8GiqwAAAEE"]
[Sun Mar 15 20:07:37.123983 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:39.477914 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:43994] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc7u3bQATo66fKoS7wBRAAAAM4"]
[Sun Mar 15 20:08:00.086615 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:08:21.133842 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:08:43.125504 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:05.134360 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:26.114967 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:48.129818 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:09.131066 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:31.109975 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:53.130820 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:14.069835 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:35.985861 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:57.125084 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:19.117855 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:20.920119 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:47162] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc81NSswJuvopo3lOgdywAAAIo"]
[Sun Mar 15 20:12:40.141297 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:56.619715 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:57090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc8-HbQATo66fKoS7wBpAAAAMI"]
[Sun Mar 15 20:13:02.125838 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:23.129809 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:25.194162 2026] [access_compat:error] [pid 21806:tid 140411624429312] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gptsh.php
[Sun Mar 15 20:13:25.323583 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wolv.php
[Sun Mar 15 20:13:25.452642 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lock.php
[Sun Mar 15 20:13:25.582074 2026] [access_compat:error] [pid 21806:tid 140411599251200] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/edorxrr.php
[Sun Mar 15 20:13:25.710272 2026] [access_compat:error] [pid 21806:tid 140411691570944] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ox.php
[Sun Mar 15 20:13:25.838821 2026] [access_compat:error] [pid 21806:tid 140411607643904] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1754569357_be.php
[Sun Mar 15 20:13:25.968019 2026] [access_compat:error] [pid 21806:tid 140411582465792] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-kd4xalrg7m.php
[Sun Mar 15 20:13:26.097583 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hplfuns.php
[Sun Mar 15 20:13:26.226663 2026] [access_compat:error] [pid 21806:tid 140411666392832] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test2.php
[Sun Mar 15 20:13:26.355293 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cah.php
[Sun Mar 15 20:13:26.487412 2026] [access_compat:error] [pid 21806:tid 140411632822016] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/boltt.php
[Sun Mar 15 20:13:26.619580 2026] [access_compat:error] [pid 21806:tid 140411708356352] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/prv8shell.php
[Sun Mar 15 20:13:26.757549 2026] [access_compat:error] [pid 21806:tid 140411540502272] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1100.php
[Sun Mar 15 20:13:26.887543 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sc_1.php
[Sun Mar 15 20:13:27.015710 2026] [access_compat:error] [pid 21806:tid 140411590858496] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1998.php
[Sun Mar 15 20:13:27.143696 2026] [access_compat:error] [pid 21806:tid 140411658000128] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wtiiy.php
[Sun Mar 15 20:13:27.271703 2026] [access_compat:error] [pid 21806:tid 140411574073088] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sxb.php
[Sun Mar 15 20:13:27.400890 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-mter.php
[Sun Mar 15 20:13:27.528857 2026] [access_compat:error] [pid 21806:tid 140411565680384] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Sun Mar 15 20:13:27.656773 2026] [access_compat:error] [pid 21806:tid 140411641214720] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hc.php
[Sun Mar 15 20:13:27.784372 2026] [access_compat:error] [pid 21806:tid 140411548894976] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Sun Mar 15 20:13:43.199264 2026] [access_compat:error] [pid 11972:tid 140411725141760] [client 20.151.11.236:55034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yussef.php
[Sun Mar 15 20:13:43.328668 2026] [access_compat:error] [pid 21533:tid 140411691570944] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0771dccd2958b85d48125d146d77e038akc.php
[Sun Mar 15 20:13:43.458717 2026] [access_compat:error] [pid 21533:tid 140411574073088] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/19.php
[Sun Mar 15 20:13:43.590266 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/we-es-o.php
[Sun Mar 15 20:13:43.736056 2026] [access_compat:error] [pid 21533:tid 140411590858496] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb5.php
[Sun Mar 15 20:13:43.865636 2026] [access_compat:error] [pid 21533:tid 140411649607424] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fe5.php
[Sun Mar 15 20:13:43.994818 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp11.php
[Sun Mar 15 20:13:46.126421 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:47.187216 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] [client 20.151.11.236:54922] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 20:13:47.187877 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] [client 20.151.11.236:55040] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 20:13:47.317629 2026] [access_compat:error] [pid 21806:tid 140411565680384] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/16.php
[Sun Mar 15 20:13:47.450289 2026] [access_compat:error] [pid 21806:tid 140411641214720] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb.php
[Sun Mar 15 20:13:47.583483 2026] [access_compat:error] [pid 21806:tid 140411557287680] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ss.php
[Sun Mar 15 20:13:47.712348 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/h2.php
[Sun Mar 15 20:13:47.841646 2026] [access_compat:error] [pid 21946:tid 140411658000128] [client 20.151.11.236:55106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-p2r3q9c8k4.php
[Sun Mar 15 20:13:47.973754 2026] [access_compat:error] [pid 21806:tid 140411607643904] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ty.php
[Sun Mar 15 20:13:48.104165 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/albin.php
[Sun Mar 15 20:13:48.239254 2026] [access_compat:error] [pid 21806:tid 140411691570944] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Sun Mar 15 20:13:48.368365 2026] [access_compat:error] [pid 21806:tid 140411725141760] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Sun Mar 15 20:13:48.498228 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fsgdjkl.php
[Sun Mar 15 20:13:48.627621 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.151.11.236:55126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/uuu.php
[Sun Mar 15 20:13:48.759585 2026] [access_compat:error] [pid 21805:tid 140411741927168] [client 20.151.11.236:55132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/by.php
[Sun Mar 15 20:13:48.895065 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 20.151.11.236:55132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Sun Mar 15 20:13:49.038794 2026] [access_compat:error] [pid 32654:tid 140411548894976] [client 20.151.11.236:55140] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/asw.php
[Sun Mar 15 20:13:49.179568 2026] [access_compat:error] [pid 11972:tid 140411574073088] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/eee.php
[Sun Mar 15 20:13:49.309550 2026] [access_compat:error] [pid 11972:tid 140411733534464] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lp6.php
[Sun Mar 15 20:13:49.439350 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akses.php
[Sun Mar 15 20:13:49.568406 2026] [access_compat:error] [pid 11972:tid 140411624429312] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/no1.php
[Sun Mar 15 20:13:49.696942 2026] [access_compat:error] [pid 11972:tid 140411582465792] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/teee.php
[Sun Mar 15 20:13:49.826145 2026] [access_compat:error] [pid 11972:tid 140411716749056] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Sun Mar 15 20:13:49.961175 2026] [access_compat:error] [pid 11972:tid 140411557287680] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Sun Mar 15 20:13:50.101076 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/kk.php
[Sun Mar 15 20:13:50.230377 2026] [access_compat:error] [pid 11972:tid 140411683178240] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Sun Mar 15 20:13:50.360286 2026] [access_compat:error] [pid 11972:tid 140411590858496] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cs.php
[Sun Mar 15 20:13:50.489458 2026] [access_compat:error] [pid 21533:tid 140411733534464] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/w2025.php
[Sun Mar 15 20:13:50.618450 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/swallowable.php
[Sun Mar 15 20:13:50.770670 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fvvff.php
[Sun Mar 15 20:13:50.900309 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a2.php
[Sun Mar 15 20:13:51.029555 2026] [access_compat:error] [pid 21533:tid 140411548894976] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sty.php
[Sun Mar 15 20:13:51.158484 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/g.php
[Sun Mar 15 20:13:51.287296 2026] [access_compat:error] [pid 21533:tid 140411674785536] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pp.php
[Sun Mar 15 20:13:51.416071 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sys.php
[Sun Mar 15 20:14:07.065928 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:14:29.126006 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:14:50.129812 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:11.144304 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:33.060016 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:55.129929 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:17.033853 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:38.122630 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:59.078572 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:20.079899 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:41.125810 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:43.450645 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:54080] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc-F7ABkC4fWIHEf8GjgQAAAFg"]
[Sun Mar 15 20:18:02.117074 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:18:18.967800 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.228.16:44002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc-OtSswJuvopo3lOgebgAAAIk"]
[Sun Mar 15 20:18:24.045874 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:18:46.133851 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:09.088945 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:30.125829 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:51.121790 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:20:12.133794 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:20:33.125980 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:10.136925 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:31.128380 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:55.046053 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:16.125965 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:43.125821 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:55.280884 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:49332] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc_T7ABkC4fWIHEf8Gj6gAAAEw"]
[Sun Mar 15 20:23:13.129809 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:23:27.251523 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:35394] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc_b3jZBu2q05ozVU8NAwAAAUQ"]
[Sun Mar 15 20:23:41.069843 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:24:13.065895 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:24:41.037802 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:03.121884 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:24.129801 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:45.121412 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:06.125797 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:27.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:48.116593 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:09.121639 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:30.105786 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:51.125810 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:12.069815 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:12.723925 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.244.31:53214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdAjLABkC4fWIHEf8GkXgAAAE0"]
[Sun Mar 15 20:28:33.109837 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:55.125787 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:55.294407 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:48868] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdAt3jZBu2q05ozVU8NcwAAAVU"]
[Sun Mar 15 20:29:16.137810 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:29:39.153802 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:01.176499 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:26.133765 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:47.129954 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:08.129790 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:29.128874 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:50.125954 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:12.132454 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:34.129808 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:55.133809 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:33:17.129891 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:33:20.216563 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.244.31:36776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdBwAlT9VtDQc7bgUxPjQAAAQo"]
[Sun Mar 15 20:33:38.134199 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:00.124958 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:21.057384 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:42.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:03.089828 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:24.113813 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:48.127331 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:10.126377 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:32.120892 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:54.101046 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:16.041800 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:37.964898 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:59.130054 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:38:20.124244 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:38:41.133791 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:03.121789 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:25.133858 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:46.125786 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:07.057844 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:29.120965 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:51.119133 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:12.129843 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:33.125785 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:55.128121 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:42:16.121780 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:42:38.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:00.128505 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:21.128071 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:42.134161 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:43.715124 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:44090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdEL3jZBu2q05ozVU8OqwAAAVg"]
[Sun Mar 15 20:44:04.037838 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:44:26.118911 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:44:48.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:09.127488 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:31.126956 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:35.034438 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.228.16:45568] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdEn7ABkC4fWIHEf8Gl3AAAAFM"]
[Sun Mar 15 20:45:52.122380 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:13.132147 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:34.129778 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:56.033863 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:47:17.124522 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:47:39.057865 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:00.125826 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49852] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:21.127233 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:43.033949 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:04.131279 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:08.642629 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.244.31:39818] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdFdHjZBu2q05ozVU8PKgAAAVU"]
[Sun Mar 15 20:49:27.126329 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:48.125308 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:10.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:31.125769 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:49.492725 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.228.16:56664] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdF2Zqj1wV0Si-OkeehRAAAAAI"]
[Sun Mar 15 20:50:53.133810 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:15.075288 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:36.123158 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:58.125835 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:52:20.117854 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:52:41.129784 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:02.129810 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:23.129806 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:45.125819 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:06.129249 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:19.226753 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.244.31:34098] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdGq3bQATo66fKoS7wFQQAAANE"]
[Sun Mar 15 20:54:27.125802 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:49.125848 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:10.129808 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:32.133784 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:54.121819 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:13.662588 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.228.16:33884] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdHHXjZBu2q05ozVU8P0gAAAUY"]
[Sun Mar 15 20:56:16.125785 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:37.069796 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:58.069530 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:57:20.129208 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:57:42.122140 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56258] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:03.134388 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:24.119490 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:45.033802 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:07.121798 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:29.129836 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:50.561935 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:39802] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdH9tSswJuvopo3lOghzAAAAIs"]
[Sun Mar 15 20:59:51.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:15.122339 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:36.137787 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:57.133784 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:01:18.058005 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:01:20.229506 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:48040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdIUNSswJuvopo3lOgiBgAAAIE"]
[Sun Mar 15 21:01:39.133733 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:01.121759 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:23.037867 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:44.129794 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:06.089805 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:27.730820 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:49.163596 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:11.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:32.129831 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:54.125854 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:16.069830 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:37.129819 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:58.129791 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:19.153847 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:40.125849 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:44.375840 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:36384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdJlNSswJuvopo3lOgiaAAAAIU"]
[Sun Mar 15 21:07:01.127622 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:07:22.036358 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:07:44.106534 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:05.152142 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:26.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:48.129446 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:10.129821 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:32.138183 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36518] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:53.158162 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:17.125915 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37030] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:33.617577 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.244.31:58852] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdKeXbQATo66fKoS7wG2wAAANE"]
[Sun Mar 15 21:10:38.121685 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:59.130232 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:20.069914 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:41.045808 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:52.540682 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:34830] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdKyLABkC4fWIHEf8GoIwAAAE8"]
[Sun Mar 15 21:12:02.136942 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:12:23.124976 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:12:44.137815 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:05.124908 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:26.117852 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:48.125833 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:09.054903 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:32.079367 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:53.111018 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:14.105900 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:36.125905 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:44.140611 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:42694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdLsLABkC4fWIHEf8GoawAAAFE"]
[Sun Mar 15 21:15:59.122257 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:16:21.125794 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:16:42.133773 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:03.121858 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:17.117846 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.228.16:47344] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdMDQlT9VtDQc7bgUxTowAAAQo"]
[Sun Mar 15 21:17:24.133028 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:45.137811 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:06.126878 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:27.134324 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:49.081793 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:10.122321 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:31.129788 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:52.034005 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:14.125772 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:36.129807 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:59.137820 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:21:06.169021 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:60236] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdM8rABkC4fWIHEf8GotwAAAFE"]
[Sun Mar 15 21:21:21.125780 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:21:42.079374 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:03.121952 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:25.125787 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:31.210695 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:48690] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdNR3bQATo66fKoS7wHpAAAAMA"]
[Sun Mar 15 21:22:46.131855 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:08.125785 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:29.120088 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:50.126565 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:11.119910 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:32.901577 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:54.125788 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:15.135071 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:36.130551 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:57.049818 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:26:21.116159 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:26:42.140243 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:03.133816 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:25.121828 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:27.063878 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdOb9SswJuvopo3lOgjyQAAAIU"]
[Sun Mar 15 21:27:46.130828 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:00.782872 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.228.16:44884] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdOkHbQATo66fKoS7wICgAAANQ"]
[Sun Mar 15 21:28:07.105990 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:28.090101 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:50.118368 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:11.117855 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:32.103472 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:58.140544 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:30:19.154139 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:30:41.133818 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:02.121840 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:24.145783 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:45.121843 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:06.125002 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:27.133867 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:39.875003 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:40484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdPp7ABkC4fWIHEf8GplAAAAFU"]
[Sun Mar 15 21:32:48.127486 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:09.395013 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.228.16:35278] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdPxbABkC4fWIHEf8GpoAAAAFU"]
[Sun Mar 15 21:33:10.030566 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:31.126506 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:53.122984 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:14.141827 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:36.120879 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:57.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:35:20.117786 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:35:41.126956 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:03.090514 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:26.126916 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:27.918867 2026] [access_compat:error] [pid 21806:tid 140411666392832] [client 103.177.124.25:52886] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Sun Mar 15 21:36:47.129938 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:09.037822 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:30.128878 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:51.119610 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:53.034564 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.244.31:37266] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdQ4XjZBu2q05ozVU8S0AAAAVM"]
[Sun Mar 15 21:38:12.125909 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:38:34.133828 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:38:56.119694 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:39:17.125774 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:39:39.057860 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:00.121983 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:21.459580 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:43.126364 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:04.129870 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:26.138437 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:48.145808 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:09.129853 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:30.029793 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:51.041819 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:12.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:33.128611 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:55.133881 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:44:17.045846 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:44:39.025829 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:00.129785 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:21.123800 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:42.125797 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:04.133811 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:25.125861 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:46.061796 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:10.061823 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:32.033861 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:53.061842 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:14.128018 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:28.823412 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:42212] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdTXNSswJuvopo3lOglFwAAAIE"]
[Sun Mar 15 21:48:35.129843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:56.121826 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:58.097132 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.228.16:48292] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdTeglT9VtDQc7bgUxV5QAAAQM"]
[Sun Mar 15 21:49:17.033818 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:49:38.134731 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:49:59.069788 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:50:21.124177 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:50:43.097936 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:04.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57006] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:25.069862 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:46.037820 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:07.125802 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:33.057888 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:54.126481 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:15.130288 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:36.125809 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:41.051866 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:52814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdUlXbQATo66fKoS7wJvAAAANc"]
[Sun Mar 15 21:53:57.129808 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:54:06.874859 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:33696] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdUrnjZBu2q05ozVU8UJAAAAVA"]
[Sun Mar 15 21:54:18.121979 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:54:39.094924 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:00.083352 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:22.069814 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:43.084669 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:07.117777 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:28.122026 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:49.122328 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:11.501952 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:33.120765 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:55.069910 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:16.119760 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:38.061865 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:59.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:59:04.098285 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.244.31:47754] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdV2Jqj1wV0Si-OkeemNQAAAAo"]
[Sun Mar 15 21:59:20.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:59:31.058625 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.228.16:59608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdV89SswJuvopo3lOglvQAAAJg"]
[Sun Mar 15 21:59:41.121990 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:02.230456 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:23.153814 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:45.129832 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:06.125776 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:29.065899 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:50.137810 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:11.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:33.117837 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:55.125770 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:17.121937 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:38.124058 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:59.133804 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:04:04.515158 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.244.31:35206] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdXBHjZBu2q05ozVU8UzwAAAVQ"]
[Sun Mar 15 22:04:21.045877 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:04:42.043748 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:56674] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdXKXbQATo66fKoS7wKvgAAANU"]
[Sun Mar 15 22:04:44.141832 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:05.079855 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:26.102687 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:47.085802 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34726] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:09.085826 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:30.041869 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:51.129810 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:12.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:33.089963 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:55.139102 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:08:16.134518 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:08:39.129794 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:00.141851 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:21.057952 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:42.126350 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:04.069855 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:04.338890 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.228.16:49136] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdYbHjZBu2q05ozVU8VZQAAAUs"]
[Sun Mar 15 22:10:28.112796 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:49.137864 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:10.114057 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:32.135090 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37820] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:53.065797 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:14.130935 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:35.042344 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:56.149806 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:13:17.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:13:39.126893 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:02.114874 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:23.133782 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:34.435276 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:37162] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdZerABkC4fWIHEf8GsfQAAAEI"]
[Sun Mar 15 22:14:44.129817 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:05.125803 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:15.488240 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:53904] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdZo9SswJuvopo3lOgm4AAAAII"]
[Sun Mar 15 22:15:27.129849 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:51.142267 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:12.122956 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:33.069924 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:55.828524 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:17.122058 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40864] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:38.129928 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:59.121881 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:18:20.553801 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:18:42.121770 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:04.121814 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:26.125797 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:47.957874 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:58.604804 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:34364] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdavtSswJuvopo3lOgnSQAAAJQ"]
[Sun Mar 15 22:20:09.069865 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:20:30.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:20:36.072850 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:52610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abda5LABkC4fWIHEf8GtDgAAAEo"]
[Sun Mar 15 22:20:51.145827 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:13.127293 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:34.129820 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:55.113913 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:17.041939 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:38.137831 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:59.133833 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:23:20.133760 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:23:41.133810 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:03.133777 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:26.123536 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:47.025844 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:08.126470 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:19.007229 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:33686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdb_9SswJuvopo3lOgnpwAAAIM"]
[Sun Mar 15 22:25:31.517805 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:49.799376 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:55056] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdcHQlT9VtDQc7bgUxZEAAAAQY"]
[Sun Mar 15 22:25:53.137806 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:14.125806 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:36.137939 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:57.129856 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:27:18.130463 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:27:47.725796 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:11.121810 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:33.123090 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:55.053546 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:29:17.131445 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:29:39.069855 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:00.127813 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:22.133806 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:25.773059 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abddMQlT9VtDQc7bgUxZ1gAAARI"]
[Sun Mar 15 22:30:43.125780 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:04.121805 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:10.296088 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.228.16:46280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abddXglT9VtDQc7bgUxZ7AAAAQA"]
[Sun Mar 15 22:31:25.037836 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:46.125788 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:07.121263 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:28.133807 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:49.137905 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:10.065821 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:32.097421 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:54.049834 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:34:18.069815 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:34:39.129085 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:03.194349 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:25.082897 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:30.977424 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.244.31:40718] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdeYnjZBu2q05ozVU8XkgAAAUw"]
[Sun Mar 15 22:35:46.122468 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:07.137790 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:14.703043 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.228.16:37184] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdejpqj1wV0Si-Okeep-AAAAAM"]
[Sun Mar 15 22:36:28.133812 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:49.041849 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:10.126589 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51914] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:31.121986 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:52.124662 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:13.125796 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:34.129851 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:55.130561 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:39:16.125840 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:39:39.126115 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:01.045801 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:23.125854 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:52.148684 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:52.546296 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.244.31:47814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdfpAlT9VtDQc7bgUxbBQAAARA"]
[Sun Mar 15 22:41:13.079950 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:41:34.045864 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:41:55.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:16.092970 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:37.118215 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:58.133784 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:43:19.125896 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:43:40.127348 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:01.141876 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:22.133821 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:43.129862 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:04.137818 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:26.121222 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:47.121829 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:13.106914 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:34.137785 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:55.121816 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:16.120042 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:37.130789 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:58.129950 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:48:24.131276 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:48:45.126627 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:06.125790 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:28.125813 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:49.121225 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:10.131425 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:32.121794 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:53.057850 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:14.129840 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:21.904451 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.244.31:39924] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdiGXjZBu2q05ozVU8ZHwAAAVM"]
[Sun Mar 15 22:51:35.141805 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:57.125797 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60370] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:52:02.210571 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:47300] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdiQnbQATo66fKoS7wQXQAAANU"]
[Sun Mar 15 22:52:19.123091 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:52:41.101825 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:02.125814 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:32794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:23.102645 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:45.125910 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:06.099219 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:27.121787 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:49.131397 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:10.121897 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:31.108537 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:55.118224 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:56:16.129764 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:56:25.806146 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:43564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdjSZqj1wV0Si-OkeesXgAAABc"]
[Sun Mar 15 22:56:40.129874 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:01.120445 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:07.143239 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.228.16:35472] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdjc5qj1wV0Si-OkeesagAAAAk"]
[Sun Mar 15 22:57:23.122337 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:44.033911 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:06.125786 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:28.156893 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:49.433859 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:11.061687 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:32.046010 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:53.053827 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:14.057881 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:35.133794 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:57.113386 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:18.129788 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:39.122904 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:45.013859 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.244.31:58418] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdkiXbQATo66fKoS7wRAwAAANI"]
[Sun Mar 15 23:02:06.141791 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:02:27.084179 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.228.16:57920] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdks3bQATo66fKoS7wRFQAAAMg"]
[Sun Mar 15 23:02:28.122825 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:02:49.131031 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:11.105451 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:32.073570 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:53.131357 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:16.122137 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:37.122720 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:58.081831 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:05:20.035702 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:05:41.129869 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:03.125769 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:24.038085 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:45.137821 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:53.873931 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:50314] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdlvQlT9VtDQc7bgUxdmQAAARQ"]
[Sun Mar 15 23:07:06.080469 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:07:27.109839 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:07:37.778095 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:40670] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdl6dSswJuvopo3lOgrGAAAAJI"]
[Sun Mar 15 23:07:49.110034 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:10.130146 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:32.143258 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:53.123194 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:14.132551 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:37.139073 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39894] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:59.144020 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:10:21.125826 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:10:42.131313 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:03.841901 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:26.113944 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:47.133917 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:08.121219 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:29.094003 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41108] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:51.063839 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:00.541684 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.228.16:41012] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdnKwlT9VtDQc7bgUxd5QAAAQg"]
[Sun Mar 15 23:13:12.121798 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:34.126650 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:55.125789 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:17.123155 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:38.117891 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:59.144580 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:15:21.122514 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:15:42.130980 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:04.129817 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:25.125831 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:47.124261 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:08.129861 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:24.348642 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.244.31:35170] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdoNAlT9VtDQc7bgUxeLAAAAQo"]
[Sun Mar 15 23:17:29.029859 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:50.812156 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:02.700272 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:52228] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdoWnbQATo66fKoS7wSIgAAAMo"]
[Sun Mar 15 23:18:12.122106 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:34.129818 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:55.122294 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:16.078064 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:38.045921 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:59.125795 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:20:20.129949 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:20:43.133926 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:04.133815 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:26.137802 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:48.061985 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:09.126401 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:30.133765 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:50.133198 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:39806] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdpenjZBu2q05ozVU8a4wAAAUM"]
[Sun Mar 15 23:22:51.077802 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:12.057974 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:21.050333 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.228.16:46910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdpmQlT9VtDQc7bgUxefwAAAQE"]
[Sun Mar 15 23:23:34.129814 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:55.069821 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:16.101836 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:37.133817 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:58.049837 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:25:20.117797 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:25:41.049852 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:04.105271 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:25.070693 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:46.129882 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:10.129837 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:31.129912 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:52.057895 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:28:00.912200 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.244.31:54194] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdqsAlT9VtDQc7bgUxe_wAAAQE"]
[Sun Mar 15 23:28:13.033821 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:28:30.894942 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.228.16:48760] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdqzpqj1wV0Si-OkeeuwwAAAAw"]
[Sun Mar 15 23:28:34.129786 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:00.129817 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:21.041898 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:42.133820 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:04.126058 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:25.125852 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:46.117797 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48376] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:07.130084 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:28.113917 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:49.131486 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:10.131628 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:32.125806 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:53.129007 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49570] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:14.125944 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:26.226965 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.244.31:33182] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdr9nbQATo66fKoS7wTGAAAAME"]
[Sun Mar 15 23:33:35.129814 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:54.544802 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:40280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdsEglT9VtDQc7bgUxgAwAAAQQ"]
[Sun Mar 15 23:33:56.133811 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:34:22.122010 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:34:43.129798 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:05.236520 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:26.080324 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:48.123325 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:10.085906 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:31.085815 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51118] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:52.057943 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:14.133779 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:36.125855 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:57.133854 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:38:18.129855 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:38:28.912343 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:41426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdtJAlT9VtDQc7bgUxgfgAAAQs"]
[Sun Mar 15 23:38:40.105222 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:01.133777 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:04.752311 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.228.16:43142] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdtSHbQATo66fKoS7wTbwAAAME"]
[Sun Mar 15 23:39:22.129804 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:43.141837 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:04.121818 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:27.136013 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:49.130198 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:10.069822 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:31.129904 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:52.160983 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:13.131926 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:37.413798 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:59.131481 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:20.129815 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:41.063599 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:49.691872 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.244.31:48550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abduZQlT9VtDQc7bgUxhCQAAAQA"]
[Sun Mar 15 23:44:02.129865 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:44:23.141798 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:44:44.129878 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:05.137913 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:26.122982 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:48.125845 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:11.125797 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:32.125779 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:53.129811 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:14.125847 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56828] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:35.129832 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:57.133810 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:48:19.129863 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:48:41.126006 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:02.133829 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:23.135960 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:44.122116 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:05.119227 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:26.137778 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:48.119429 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:10.033877 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:31.125925 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:54.121817 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:15.128488 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:36.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:57.125784 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:53:18.145895 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:53:41.097904 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:02.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33344] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:22.446348 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:50538] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdw3rABkC4fWIHEf8G3NQAAAFY"]
[Sun Mar 15 23:54:24.149915 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:46.119817 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:58.765682 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.228.16:40986] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdxAv9ocpUE4ed4uDy7dQAAAhQ"]
[Sun Mar 15 23:55:53.117802 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:56:14.089932 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:56:40.095984 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:01.069910 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:22.125896 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36118] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:44.122006 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:06.045850 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:27.133784 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:49.134612 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:10.121776 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:32.134252 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:34.609138 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.244.31:53648] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdyFglT9VtDQc7bgUxicQAAAQY"]
[Sun Mar 15 23:59:53.121779 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:07.565634 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.228.16:41356] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdyNxXjF1vJNtV6CWrFaAAAAdM"]
[Mon Mar 16 00:00:14.125820 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37272] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:35.134497 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:56.033860 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37562] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:01:17.050150 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:01:38.138359 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:01.133822 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38006] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:22.149980 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:43.125780 2026] [proxy_fcgi:error] [pid 10709:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38382] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:05.137797 2026] [proxy_fcgi:error] [pid 10651:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38544] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:26.106684 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:48.129793 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38780] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:11.129884 2026] [proxy_fcgi:error] [pid 10831:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:33.129790 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39086] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:54.129805 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:57.632284 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:49090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdzWdSswJuvopo3lOgvIgAAAII"]
[Mon Mar 16 00:05:15.157829 2026] [proxy_fcgi:error] [pid 10831:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:05:37.112474 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:05:39.490589 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.228.16:56374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdzg7ABkC4fWIHEf8G3nQAAAEw"]
[Mon Mar 16 00:05:59.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39632] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:06:20.053806 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39780] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:06:42.121802 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:03.041877 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:24.133792 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40298] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:47.165789 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:08.135505 2026] [proxy_fcgi:error] [pid 10709:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:29.057819 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40888] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:50.132376 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:11.145810 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:33.131460 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41516] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:54.125822 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:08.881892 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.244.31:38886] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd0kLysWC90G-1nBrATkQAAAZA"]
[Mon Mar 16 00:10:16.122507 2026] [proxy_fcgi:error] [pid 10651:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:37.124730 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:47.214933 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.228.16:47202] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd0txXjF1vJNtV6CWrF3wAAAcc"]
[Mon Mar 16 00:10:58.125800 2026] [proxy_fcgi:error] [pid 10772:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42124] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:11:19.087442 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:11:40.132772 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:03.144074 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42746] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:24.122518 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:45.153812 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:08.140336 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43396] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:29.103715 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:51.136300 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43782] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:14:17.127961 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:14:39.117811 2026] [proxy_fcgi:error] [pid 10651:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:00.129864 2026] [proxy_fcgi:error] [pid 10831:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:21.125824 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44548] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:42.133794 2026] [proxy_fcgi:error] [pid 10651:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44786] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:03.133787 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44974] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:06.752922 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.228.16:59220] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd19hXjF1vJNtV6CWrGaAAAAdU"]
[Mon Mar 16 00:16:25.057801 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45188] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:46.057825 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:07.122643 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:28.135175 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:50.137823 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45770] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:11.140345 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45916] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:32.141777 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46040] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:53.125823 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46190] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:19:14.114294 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46380] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:19:38.085865 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46554] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:00.113906 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46850] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:21.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47128] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:36.098770 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.244.31:37738] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd3BNSswJuvopo3lOgvzgAAAJE"]
[Mon Mar 16 00:20:42.131406 2026] [proxy_fcgi:error] [pid 10772:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47342] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:03.126725 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:11.071329 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.228.16:54208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd3JwlT9VtDQc7bgUxkWAAAARM"]
[Mon Mar 16 00:21:24.045856 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:45.129566 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:07.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48150] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:28.131959 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48318] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:49.134861 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48536] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:10.119065 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48718] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:32.094929 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48896] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:53.094181 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49064] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:14.122236 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:35.127322 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49448] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:56.033823 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49656] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:25:18.122303 2026] [proxy_fcgi:error] [pid 10831:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:25:43.033795 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50054] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:04.129283 2026] [proxy_fcgi:error] [pid 10831:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50194] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:17.673229 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.244.31:43860] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd4WQlT9VtDQc7bgUxkzQAAAQ0"]
[Mon Mar 16 00:26:25.137796 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:34.363180 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.228.16:43308] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd4ao6lpbStxTqkSks5bQAAAkQ"]
[Mon Mar 16 00:26:47.078030 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:08.289256 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:29.492613 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51004] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:51.121912 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51216] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:13.139670 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:34.127033 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51490] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:55.129794 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:16.045848 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:37.021913 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51884] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:58.129817 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52042] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:30:20.133146 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:30:41.057829 2026] [proxy_fcgi:error] [pid 10831:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:04.128667 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52488] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:27.129783 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:48.131504 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:09.129845 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:13.308254 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:41638] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd5vXjZBu2q05ozVU8fygAAAUk"]
[Mon Mar 16 00:32:30.133822 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:48.462826 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:45582] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd54LABkC4fWIHEf8G4tQAAAE4"]
[Mon Mar 16 00:32:51.139589 2026] [proxy_fcgi:error] [pid 10831:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53116] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:12.057829 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:35.133793 2026] [proxy_fcgi:error] [pid 10772:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53524] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:56.130039 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:17.122978 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:38.123436 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53944] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:59.077829 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:35:20.125865 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54252] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:35:42.120514 2026] [proxy_fcgi:error] [pid 10709:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54394] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:03.130074 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54556] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:25.137884 2026] [proxy_fcgi:error] [pid 10709:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54712] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:46.033881 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54830] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:10.133907 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:19.155093 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:60096] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd677ABkC4fWIHEf8G44QAAAEw"]
[Mon Mar 16 00:37:31.124776 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55162] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:52.149898 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55312] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:53.299780 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:36614] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd7EbABkC4fWIHEf8G49gAAAEs"]
[Mon Mar 16 00:38:13.134107 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:38:34.129786 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:38:56.135224 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55786] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:39:21.033880 2026] [proxy_fcgi:error] [pid 10772:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:39:42.121730 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56110] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:03.127520 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56224] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:25.125818 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:47.123894 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:12.082046 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:33.069916 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56802] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:54.136637 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:15.095110 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57086] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:37.133960 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57258] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:40.147351 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.244.31:51486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd8MJqj1wV0Si-Okee0qQAAAAM"]
[Mon Mar 16 00:42:58.129824 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:43:13.357197 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:45854] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd8UQlT9VtDQc7bgUxlzgAAAQY"]
[Mon Mar 16 00:43:19.212721 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57496] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:43:40.066956 2026] [proxy_fcgi:error] [pid 10709:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:01.072032 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57802] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:22.069962 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57960] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:44.108044 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:05.102171 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:26.081166 2026] [proxy_fcgi:error] [pid 10772:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58346] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:49.129892 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58494] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:10.126184 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:31.133780 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58794] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:52.059690 2026] [proxy_fcgi:error] [pid 10709:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:14.418970 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:36.069901 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:48.797321 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.244.31:41258] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd9ZI6lpbStxTqkSks6JgAAAlA"]
[Mon Mar 16 00:47:57.125818 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:48:18.129839 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59540] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:48:39.149788 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:00.037861 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59832] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:21.129828 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:42.142310 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60104] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:03.125825 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60198] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:24.134593 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60278] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:46.133283 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:08.125783 2026] [proxy_fcgi:error] [pid 10772:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:29.130566 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60686] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:50.133776 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60854] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:12.025817 2026] [proxy_fcgi:error] [pid 10709:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60976] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:33.061836 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:54.125825 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:16.054289 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:37.137811 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33348] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:58.066614 2026] [proxy_fcgi:error] [pid 10651:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:54:19.121817 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33672] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:54:40.053820 2026] [proxy_fcgi:error] [pid 10831:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33768] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:01.118303 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:22.129855 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:43.120850 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34172] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:04.103733 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:26.134332 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34396] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:47.113877 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34516] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:08.077785 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34626] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:30.059429 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34730] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:51.135445 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:12.120722 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35012] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:21.879565 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:57938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd_3Zqj1wV0Si-Okee1DwAAABg"]
[Mon Mar 16 00:58:33.068559 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:42.271074 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.228.16:60250] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd_8v9ocpUE4ed4uDy-hwAAAgk"]
[Mon Mar 16 00:58:54.121798 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35296] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:15.121831 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:36.133848 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:57.089853 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35634] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:00:18.061989 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35764] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:00:39.125806 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:00.125803 2026] [proxy_fcgi:error] [pid 10651:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:21.058344 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36072] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:43.034174 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36164] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:04.073106 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:25.121766 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36426] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:47.045830 2026] [proxy_fcgi:error] [pid 10651:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36574] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:09.046019 2026] [proxy_fcgi:error] [pid 10651:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36696] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:30.033957 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36826] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:39.853213 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.244.31:40258] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeBG_9ocpUE4ed4uDy-qAAAAgU"]
[Mon Mar 16 01:03:51.133824 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37010] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:04.104233 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.228.16:46350] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeBNBXjF1vJNtV6CWrH_QAAAco"]
[Mon Mar 16 01:04:12.136725 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:33.070261 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:54.129785 2026] [proxy_fcgi:error] [pid 10772:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37374] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:15.125885 2026] [proxy_fcgi:error] [pid 10709:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:36.129781 2026] [proxy_fcgi:error] [pid 10651:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:57.057995 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:06:19.152239 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:06:40.112050 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:02.133780 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38150] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:23.060051 2026] [proxy_fcgi:error] [pid 10651:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:44.129857 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38442] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:05.125839 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:26.129852 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:47.085974 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:47.628301 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.244.31:41044] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeCT5qj1wV0Si-Okee1iwAAAAk"]
[Mon Mar 16 01:09:06.918890 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.228.16:42448] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeCYo6lpbStxTqkSks69gAAAkU"]
[Mon Mar 16 01:09:09.129826 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39052] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:09:30.097832 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:09:51.045897 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:12.118311 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:33.126487 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:58.197956 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:11:16.562304 2026] [core:alert] [pid 10772:tid 140411708356352] [client 13.38.45.165:37226] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 01:11:19.422903 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] [client 5.35.38.15:59784] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/
[Mon Mar 16 01:11:21.045859 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39952] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:11:43.062339 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:05.097925 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40340] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:26.121799 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:47.126476 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40656] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:08.045925 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:31.069884 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:52.101849 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:09.242891 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.244.31:56928] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeDkY6lpbStxTqkSks7GQAAAkU"]
[Mon Mar 16 01:14:13.057899 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41178] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:28.240149 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:59432] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeDpAlT9VtDQc7bgUxnhQAAAQY"]
[Mon Mar 16 01:14:35.057958 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:56.129714 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41500] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:15:18.125309 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41682] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:15:39.141783 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:00.140077 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41916] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:22.117724 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:44.129829 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:05.082247 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42424] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:28.083057 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42580] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:50.128736 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42740] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:11.111345 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:33.085802 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:54.139673 2026] [proxy_fcgi:error] [pid 10709:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:15.133773 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:35.204841 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.228.16:60866] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeE17ABkC4fWIHEf8G6gAAAAEU"]
[Mon Mar 16 01:19:36.125871 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:57.128096 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:20:18.129835 2026] [proxy_fcgi:error] [pid 10709:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:20:40.131430 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43760] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:01.030332 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:22.129775 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44108] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:25.815122 2026] [:error] [pid 11972:tid 140411548894976] [client 209.38.248.17:60938] [client 209.38.248.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "<\\\\?(?!xml|xpacket)" at ARGS_NAMES:<?php $env["USERNAME"] . [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "6"] [id "959151"] [rev "2"] [msg "PHP Injection Attack"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/php-cgi/php-cgi.exe"] [unique_id "abeFRZqj1wV0Si-Okee2PwAAABc"]
[Mon Mar 16 01:21:25.816398 2026] [:error] [pid 21805:tid 140411607643904] [client 159.223.132.86:42260] [client 159.223.132.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "<\\\\?(?!xml|xpacket)" at ARGS_NAMES:<?php $env["USERNAME"] . [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "6"] [id "959151"] [rev "2"] [msg "PHP Injection Attack"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/php-cgi/php-cgi.exe"] [unique_id "abeFRLABkC4fWIHEf8G6oAAAAFA"]
[Mon Mar 16 01:21:26.151346 2026] [access_compat:error] [pid 11972:tid 140411565680384] [client 159.223.132.86:42264] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 01:21:26.714818 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 209.38.248.17:60948] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 01:21:43.140412 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:05.125811 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44394] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:26.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44530] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:50.077827 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44658] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:11.130633 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:32.149769 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44868] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:54.121468 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45068] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:15.121944 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45200] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:36.142042 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:36.202442 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:35344] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeGBJqj1wV0Si-Okee2bQAAABc"]
[Mon Mar 16 01:24:50.110356 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.228.16:56600] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeGErysWC90G-1nBrAWhgAAAY0"]
[Mon Mar 16 01:24:57.113723 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:25:18.120651 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45620] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:25:39.045845 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:08.122856 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45992] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:32.131288 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:54.126030 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:27:17.128555 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:27:38.089823 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:00.131169 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:21.053817 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47264] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:42.126375 2026] [proxy_fcgi:error] [pid 10831:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:03.069964 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:24.129844 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:40.201085 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.244.31:57682] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeHNLABkC4fWIHEf8G68wAAAEc"]
[Mon Mar 16 01:29:45.129805 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47906] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:54.833613 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.228.16:32952] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeHQnjZBu2q05ozVU8iNwAAAVY"]
[Mon Mar 16 01:30:06.109828 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:30:27.132186 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:30:48.130920 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:09.135409 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48408] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:30.133836 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:53.133816 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:16.131014 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:38.033795 2026] [proxy_fcgi:error] [pid 10651:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:59.129902 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49322] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:33:21.145883 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:33:42.148826 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49676] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:04.033801 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:26.070064 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49990] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:47.125821 2026] [proxy_fcgi:error] [pid 10709:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:02.267513 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:42370] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeIdrABkC4fWIHEf8G7HgAAAEs"]
[Mon Mar 16 01:35:08.141265 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:19.082016 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:57876] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeIhwlT9VtDQc7bgUxo-QAAAQY"]
[Mon Mar 16 01:35:29.120226 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:50.038508 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:11.089831 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50828] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:32.153307 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:53.131597 2026] [proxy_fcgi:error] [pid 10772:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:14.133813 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:37.149912 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51302] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:59.069847 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51454] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:38:21.141186 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:38:43.099567 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51714] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:04.119881 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:25.139321 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:47.122796 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:07.127730 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.244.31:33478] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeJpwlT9VtDQc7bgUxpTAAAAQw"]
[Mon Mar 16 01:40:08.125807 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52278] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:21.718705 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.228.16:34384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeJtZqj1wV0Si-Okee2_wAAABY"]
[Mon Mar 16 01:40:29.033994 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:50.135989 2026] [proxy_fcgi:error] [pid 10772:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52644] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:11.121988 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:32.249845 2026] [proxy_fcgi:error] [pid 10831:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52836] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:54.131312 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:15.041848 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53142] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:38.129918 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:59.057330 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:43:20.415111 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53546] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:43:43.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53696] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:05.131190 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:26.129875 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:48.133860 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:10.133778 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:30.883917 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.244.31:45932] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeK6rysWC90G-1nBrAXOQAAAYE"]
[Mon Mar 16 01:45:31.129838 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54576] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:41.630136 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:54782] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeK9Y6lpbStxTqkSks8dgAAAlQ"]
[Mon Mar 16 01:45:57.123902 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54754] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:46:18.029857 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54962] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:46:40.125890 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:01.129837 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55296] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:22.129874 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:43.136405 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:04.129848 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55734] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:25.098818 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:46.133797 2026] [proxy_fcgi:error] [pid 10831:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:08.125807 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56088] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:29.133800 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56210] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:50.129773 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56354] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:11.673785 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:33.130112 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:54.137849 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56716] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:15.125834 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:36.117838 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56878] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:43.733812 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.244.31:33214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeMXxXjF1vJNtV6CWrJjAAAAc4"]
[Mon Mar 16 01:52:01.069852 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57074] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:52:22.137822 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57142] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:52:43.137821 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57244] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:04.126939 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57428] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:25.037856 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:46.119626 2026] [proxy_fcgi:error] [pid 10709:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57754] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:07.121790 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57892] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:31.129785 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:53.133917 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:14.126507 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58242] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:35.069877 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:57.857805 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58538] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:56:19.133779 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58678] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:56:40.113880 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:01.077803 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58978] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:22.109541 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:43.106518 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:04.133782 2026] [proxy_fcgi:error] [pid 10831:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:25.137806 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59668] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:46.069911 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:07.057907 2026] [proxy_fcgi:error] [pid 10709:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59946] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:28.133817 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60104] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:50.121897 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60270] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:14.129814 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:35.129853 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:56.029961 2026] [proxy_fcgi:error] [pid 10709:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60844] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:01:18.860317 2026] [proxy_fcgi:error] [pid 10709:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:01:40.115754 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:01.134057 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33154] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:15.361226 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:57542] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeO146lpbStxTqkSks9WgAAAkw"]
[Mon Mar 16 02:02:22.134283 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33406] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:23.513528 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.228.16:49444] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeO3_9ocpUE4ed4uDzA4wAAAgw"]
[Mon Mar 16 02:02:43.133974 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:04.157819 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33686] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:25.126684 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33806] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:46.125921 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33930] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:07.141793 2026] [proxy_fcgi:error] [pid 10831:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34076] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:22.029954 2026] [mime_magic:error] [pid 21946:tid 140411674785536] (70014)End of file found: [client 34.206.76.135:58831] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 02:04:22.030443 2026] [access_compat:error] [pid 21946:tid 140411674785536] [client 34.206.76.135:58831] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Mon Mar 16 02:04:33.041903 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:55.913526 2026] [proxy_fcgi:error] [pid 10651:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34370] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:17.083827 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:38.069815 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:59.141945 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34812] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:06:20.125955 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:06:42.122771 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35130] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:04.077903 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:18.901908 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:46200] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeQBrABkC4fWIHEf8G8jgAAAFA"]
[Mon Mar 16 02:07:25.129774 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:26.626850 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:37574] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeQDnbQATo66fKoS7wbggAAAMw"]
[Mon Mar 16 02:07:46.133827 2026] [proxy_fcgi:error] [pid 10709:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35508] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:07.133930 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:28.131700 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:50.125901 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:11.033823 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36106] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:32.133812 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:53.021855 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:10:17.129797 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:10:39.037948 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:00.125831 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:21.132905 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:42.069827 2026] [proxy_fcgi:error] [pid 10709:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37270] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:12:28.125858 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:12:45.842673 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.228.16:55454] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeRTRXjF1vJNtV6CWrLDAAAAdg"]
[Mon Mar 16 02:12:46.544755 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.244.31:40298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeRThXjF1vJNtV6CWrLDgAAAcY"]
[Mon Mar 16 02:13:08.124221 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38560] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:13:29.129850 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:13:50.129768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38894] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:11.129831 2026] [proxy_fcgi:error] [pid 10831:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:32.033860 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39212] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:53.041917 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:14.121992 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:36.121860 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39634] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:57.137758 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:16:19.389777 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39962] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:16:41.125784 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40120] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:02.129151 2026] [proxy_fcgi:error] [pid 10651:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40308] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:24.070458 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:45.133854 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:47.451321 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.228.16:33440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeSewlT9VtDQc7bgUxs3AAAARA"]
[Mon Mar 16 02:17:52.858742 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.244.31:54628] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeSgLysWC90G-1nBrAYwwAAAZM"]
[Mon Mar 16 02:18:06.145815 2026] [proxy_fcgi:error] [pid 10651:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:18:27.144675 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:18:51.121795 2026] [proxy_fcgi:error] [pid 10709:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41238] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:13.138078 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:34.091678 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:55.134534 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41718] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:20:21.133846 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:20:43.140988 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42006] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:04.121808 2026] [proxy_fcgi:error] [pid 10772:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:25.129837 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:46.069829 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:07.117827 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42442] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:28.167116 2026] [proxy_fcgi:error] [pid 10831:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:49.117801 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:10.115397 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:15.776008 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:59194] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeTw5qj1wV0Si-Okee6EgAAABg"]
[Mon Mar 16 02:23:32.137805 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:53.146872 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43166] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:14.124495 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43338] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:35.130170 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43512] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:56.029878 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:25:17.130263 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43756] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:25:42.144131 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43934] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:05.145979 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44164] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:26.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44320] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:47.143738 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:08.122759 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44670] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:29.053786 2026] [proxy_fcgi:error] [pid 10831:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:50.121790 2026] [proxy_fcgi:error] [pid 10831:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44898] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:11.133803 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45026] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:21.302886 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:41624] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeU9Zqj1wV0Si-Okee6JQAAAA4"]
[Mon Mar 16 02:28:25.502608 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.244.31:51008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeU-Y6lpbStxTqkSks_CAAAAkY"]
[Mon Mar 16 02:28:32.057863 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45158] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:54.045920 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45312] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:16.084558 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:38.093819 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:56.700311 2026] [access_compat:error] [pid 10772:tid 140411607643904] [client 45.148.10.174:37170] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 02:29:59.045967 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:30:09.537933 2026] [core:alert] [pid 11972:tid 140411658000128] [client 45.148.10.174:58556] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 02:30:10.768896 2026] [mime_magic:error] [pid 21806:tid 140411691570944] (70014)End of file found: [client 45.148.10.174:40064] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 02:30:17.366699 2026] [access_compat:error] [pid 10651:tid 140411741927168] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 02:30:17.574214 2026] [access_compat:error] [pid 10651:tid 140411607643904] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 02:30:17.808731 2026] [access_compat:error] [pid 10651:tid 140411548894976] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 02:30:21.037785 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45762] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:30:42.137806 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45862] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:03.121863 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45994] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:27.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:48.137854 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46298] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:09.133804 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:30.126914 2026] [proxy_fcgi:error] [pid 10709:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46536] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:51.122259 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46676] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:12.117224 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:33.085154 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47054] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:43.499961 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.228.16:41042] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeWN46lpbStxTqkSks_NwAAAkA"]
[Mon Mar 16 02:33:46.728899 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:36010] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeWOnbQATo66fKoS7wcRwAAAMs"]
[Mon Mar 16 02:33:54.117777 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:15.127371 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:38.077919 2026] [proxy_fcgi:error] [pid 10831:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:59.127539 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:35:25.133857 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:35:46.048460 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48016] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:07.133937 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:29.129849 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:50.037894 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48492] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:11.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48640] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:32.122279 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:53.127214 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:15.153866 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49112] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:36.138666 2026] [proxy_fcgi:error] [pid 10831:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49238] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:44.210440 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.228.16:42932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeXZJqj1wV0Si-Okee7MgAAAAE"]
[Mon Mar 16 02:38:50.001591 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:40952] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeXadSswJuvopo3lOg1_QAAAIM"]
[Mon Mar 16 02:38:58.123567 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:39:19.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49626] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:39:40.133933 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:01.122144 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50004] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:22.141853 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:47.125886 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:08.113606 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:30.393929 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50642] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:52.045882 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50778] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:13.125917 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50910] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:34.137861 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:55.037869 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51130] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:16.106128 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51202] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:37.131036 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:58.102056 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:44:02.091285 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.228.16:33802] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeYoglT9VtDQc7bgUxu8QAAAQ4"]
[Mon Mar 16 02:44:19.125888 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51562] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:44:38.360069 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.244.31:38470] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeYxhXjF1vJNtV6CWrM-QAAAc8"]
[Mon Mar 16 02:44:40.062005 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51680] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:01.084618 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51808] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:23.543307 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:45.125804 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:10.087184 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52332] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:31.134943 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52436] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:53.071022 2026] [proxy_fcgi:error] [pid 10651:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:15.137823 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:36.113887 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:57.126127 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:48:18.137847 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:48:39.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:00.121417 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53400] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:21.133792 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:42.129940 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:03.133841 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53730] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:13.474489 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.228.16:48482] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeaFQlT9VtDQc7bgUxvrAAAARc"]
[Mon Mar 16 02:50:24.129793 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53862] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:34.975009 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.244.31:54900] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeaKnbQATo66fKoS7wdNwAAANQ"]
[Mon Mar 16 02:50:45.115806 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:06.084465 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:29.125946 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:52.134108 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:14.074020 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54512] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:37.057987 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:58.131363 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:53:20.128134 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55034] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:53:41.130297 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:02.118155 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55310] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:23.125800 2026] [proxy_fcgi:error] [pid 10651:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:44.129184 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55588] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:05.121442 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55716] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:26.125957 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55814] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:35.593114 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.244.31:58692] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abebVxXjF1vJNtV6CWrNaQAAAck"]
[Mon Mar 16 02:55:47.127263 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:08.033784 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:29.127744 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:50.110004 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56340] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:13.137789 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:35.118247 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56602] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:59.117868 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:58:21.137834 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:58:42.138662 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:04.120010 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:25.049573 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57524] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:46.129980 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:07.129807 2026] [proxy_fcgi:error] [pid 10709:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:28.129817 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58098] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:49.151466 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:10.125806 2026] [proxy_fcgi:error] [pid 10831:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58448] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:31.106389 2026] [proxy_fcgi:error] [pid 10831:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58600] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:52.129796 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58746] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:13.121875 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58918] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:34.116794 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59036] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:58.045838 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:03:20.126204 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59404] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:03:42.085648 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59568] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:03.057864 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:26.129813 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:47.033809 2026] [proxy_fcgi:error] [pid 10831:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60090] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:09.625857 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:31.097919 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60434] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:52.081798 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60692] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:57.429209 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.228.16:43778] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abedxRXjF1vJNtV6CWrN3wAAAcs"]
[Mon Mar 16 03:06:13.046053 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60848] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:06:14.664761 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:57412] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abed1tSswJuvopo3lOg3HAAAAIo"]
[Mon Mar 16 03:06:34.121804 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:32842] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:06:56.135134 2026] [proxy_fcgi:error] [pid 10772:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:17.121682 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:38.139340 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:59.121852 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:08:20.131486 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:08:42.097807 2026] [proxy_fcgi:error] [pid 10831:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33762] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:03.126466 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33902] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:24.142105 2026] [proxy_fcgi:error] [pid 10709:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:48.529515 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:10.125794 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:33.128169 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34430] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:54.125791 2026] [proxy_fcgi:error] [pid 10651:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:15.065847 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:18.189843 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.228.16:58008] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abefBhXjF1vJNtV6CWrN-QAAAcE"]
[Mon Mar 16 03:11:37.061953 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:42.483892 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:37264] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abefHrABkC4fWIHEf8HADQAAAFU"]
[Mon Mar 16 03:11:58.097994 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:12:20.493883 2026] [proxy_fcgi:error] [pid 10831:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:12:42.129400 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:03.137785 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:24.129784 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:31.163601 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] [client 179.188.53.243:35760] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.163646 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (104)Connection reset by peer: [client 179.188.53.243:35760] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.163962 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] [client 179.188.53.243:36094] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.163973 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:36094] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.165390 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] [client 179.188.53.243:35938] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.165422 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (104)Connection reset by peer: [client 179.188.53.243:35938] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.165952 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] [client 179.188.53.243:37060] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.165984 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:37060] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.166405 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] [client 179.188.53.243:35648] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.166434 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (104)Connection reset by peer: [client 179.188.53.243:35648] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.175623 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] [client 179.188.53.243:36490] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.175651 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:36490] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.175926 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] [client 179.188.53.243:36362] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.175936 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:36362] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.176126 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] [client 179.188.53.243:36230] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176138 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:36230] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.176323 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] [client 179.188.53.243:37156] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176332 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:37156] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.176543 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] [client 179.188.53.243:36778] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176572 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:36778] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.181775 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] [client 179.188.53.243:36658] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.181817 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:36658] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.182023 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] [client 179.188.53.243:37248] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.182042 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (104)Connection reset by peer: [client 179.188.53.243:37248] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.182675 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] [client 179.188.53.243:36914] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.182692 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:36914] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.185158 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] [client 69.197.179.242:33130] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-includes/imddc187/edit.php?id=212809
[Mon Mar 16 03:13:31.185175 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (104)Connection reset by peer: [client 69.197.179.242:33130] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-includes/imddc187/edit.php?id=212809
[Mon Mar 16 03:13:31.190388 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] [client 179.188.53.243:37324] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.190423 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:37324] AH01075: Error dispatching request to : 
[Mon Mar 16 03:16:27.043640 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.228.16:45364] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abegO5qj1wV0Si-Okee9cwAAAA0"]
[Mon Mar 16 03:16:53.608392 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:47626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abegVXbQATo66fKoS7wfRwAAAMs"]
[Mon Mar 16 03:21:49.122820 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.228.16:55606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abehfZqj1wV0Si-Okee9qgAAAAE"]
[Mon Mar 16 03:22:17.086365 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:36604] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abehmZqj1wV0Si-Okee9qwAAABU"]
[Mon Mar 16 03:26:53.456773 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.228.16:34034] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeirY6lpbStxTqkSktBpwAAAko"]
[Mon Mar 16 03:32:11.003709 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.228.16:44152] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abej63jZBu2q05ozVU8oaQAAAVc"]
[Mon Mar 16 03:32:50.595105 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:57432] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abekEtSswJuvopo3lOg4dgAAAIM"]
[Mon Mar 16 03:37:19.830054 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:53586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abelH3jZBu2q05ozVU8orwAAAUU"]
[Mon Mar 16 03:37:56.087966 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:33016] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abelRHjZBu2q05ozVU8otQAAAVg"]
[Mon Mar 16 03:42:47.976275 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:60770] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abemZ46lpbStxTqkSktCPwAAAlQ"]
[Mon Mar 16 03:43:19.683153 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:43480] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abemh9SswJuvopo3lOg5gwAAAIY"]
[Mon Mar 16 03:47:57.990787 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.228.16:38036] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abennY6lpbStxTqkSktCawAAAlY"]
[Mon Mar 16 03:49:28.826788 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.244.31:53350] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aben-HjZBu2q05ozVU8pgwAAAU4"]
[Mon Mar 16 03:53:26.421225 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.228.16:35054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeo5nbQATo66fKoS7wgwwAAANg"]
[Mon Mar 16 03:54:36.486917 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.244.31:55686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abepLAlT9VtDQc7bgUx1rgAAAQY"]
[Mon Mar 16 04:00:04.539472 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:60352] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeqdNSswJuvopo3lOg6QAAAAIY"]
[Mon Mar 16 04:09:06.110200 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:38440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abesknbQATo66fKoS7whpQAAAMw"]
[Mon Mar 16 04:10:36.574849 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.244.31:33726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abes7Jqj1wV0Si-OkefARgAAAAs"]
[Mon Mar 16 04:14:29.430639 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:42796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abet1Zqj1wV0Si-OkefAbQAAAAg"]
[Mon Mar 16 04:15:47.123005 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:44652] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeuI9SswJuvopo3lOg60wAAAII"]
[Mon Mar 16 04:19:39.681143 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:41922] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abevC9SswJuvopo3lOg66gAAAJM"]
[Mon Mar 16 04:21:19.523214 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:45066] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abevb7ABkC4fWIHEf8HDPQAAAFc"]
[Mon Mar 16 04:25:09.619546 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:42538] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abewVdSswJuvopo3lOg7DQAAAIw"]
[Mon Mar 16 04:25:51.686148 2026] [mime_magic:error] [pid 21533:tid 140411658000128] (70014)End of file found: [client 82.97.199.54:40113] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 04:26:21.935348 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.244.31:53512] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abewnXjZBu2q05ozVU8sLwAAAVE"]
[Mon Mar 16 04:30:20.402557 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.228.16:48816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abexjLysWC90G-1nBrAe3QAAAYE"]
[Mon Mar 16 04:35:42.102499 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.228.16:45832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeyzhXjF1vJNtV6CWrTDwAAAcI"]
[Mon Mar 16 04:36:45.209900 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:52524] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abezDZqj1wV0Si-OkefBkgAAABE"]
[Mon Mar 16 04:40:46.299104 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.228.16:36900] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abez_njZBu2q05ozVU8tsAAAAVg"]
[Mon Mar 16 04:42:06.828071 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:35666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe0Tpqj1wV0Si-OkefBxQAAABA"]
[Mon Mar 16 04:46:13.429344 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:57530] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe1RdSswJuvopo3lOg8BAAAAJE"]
[Mon Mar 16 04:47:15.904643 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:55910] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe1g9SswJuvopo3lOg8CQAAAII"]
[Mon Mar 16 04:51:21.907401 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:35032] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe2eQlT9VtDQc7bgUx4vwAAARg"]
[Mon Mar 16 04:52:37.151965 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.244.31:53034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe2xXjZBu2q05ozVU8uYwAAAVA"]
[Mon Mar 16 04:56:46.331805 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.228.16:48992] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe3vhXjF1vJNtV6CWrT7AAAAcY"]
[Mon Mar 16 04:57:44.393367 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.244.31:46636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe3-BXjF1vJNtV6CWrT8wAAAc4"]
[Mon Mar 16 05:03:06.055762 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:59514] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe5OtSswJuvopo3lOg8wQAAAJM"]
[Mon Mar 16 05:07:59.007503 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gptsh.php
[Mon Mar 16 05:07:59.205249 2026] [access_compat:error] [pid 32654:tid 140411590858496] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wolv.php
[Mon Mar 16 05:07:59.406779 2026] [access_compat:error] [pid 32654:tid 140411683178240] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lock.php
[Mon Mar 16 05:07:59.608281 2026] [access_compat:error] [pid 32654:tid 140411674785536] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/edorxrr.php
[Mon Mar 16 05:07:59.809616 2026] [access_compat:error] [pid 32654:tid 140411599251200] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ox.php
[Mon Mar 16 05:08:00.004909 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1754569357_be.php
[Mon Mar 16 05:08:00.204581 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-kd4xalrg7m.php
[Mon Mar 16 05:08:00.399930 2026] [access_compat:error] [pid 32654:tid 140411557287680] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hplfuns.php
[Mon Mar 16 05:08:00.600455 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test2.php
[Mon Mar 16 05:08:00.795485 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cah.php
[Mon Mar 16 05:08:00.993882 2026] [access_compat:error] [pid 32654:tid 140411548894976] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/boltt.php
[Mon Mar 16 05:08:01.195314 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/100.php
[Mon Mar 16 05:08:01.396136 2026] [access_compat:error] [pid 10831:tid 140411683178240] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rand.php
[Mon Mar 16 05:08:01.591009 2026] [access_compat:error] [pid 10831:tid 140411641214720] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/randoms.php
[Mon Mar 16 05:08:01.788287 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1998.php
[Mon Mar 16 05:08:01.982470 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wtiiy.php
[Mon Mar 16 05:08:02.183267 2026] [access_compat:error] [pid 10831:tid 140411666392832] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sxb.php
[Mon Mar 16 05:08:02.387908 2026] [access_compat:error] [pid 10831:tid 140411557287680] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-mter.php
[Mon Mar 16 05:08:02.584629 2026] [access_compat:error] [pid 10831:tid 140411540502272] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Mon Mar 16 05:08:02.780339 2026] [access_compat:error] [pid 10831:tid 140411582465792] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hc.php
[Mon Mar 16 05:08:02.976432 2026] [access_compat:error] [pid 10831:tid 140411632822016] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Mon Mar 16 05:08:03.181311 2026] [access_compat:error] [pid 10831:tid 140411658000128] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/awh.php
[Mon Mar 16 05:08:03.377669 2026] [access_compat:error] [pid 10831:tid 140411708356352] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yussef.php
[Mon Mar 16 05:08:03.572686 2026] [access_compat:error] [pid 10831:tid 140411725141760] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0771dccd2958b85d48125d146d77e038akc.php
[Mon Mar 16 05:08:03.791001 2026] [access_compat:error] [pid 10831:tid 140411741927168] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/19.php
[Mon Mar 16 05:08:03.986839 2026] [access_compat:error] [pid 10831:tid 140411691570944] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb5.php
[Mon Mar 16 05:08:04.191554 2026] [access_compat:error] [pid 10831:tid 140411716749056] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fe5.php
[Mon Mar 16 05:08:04.387972 2026] [access_compat:error] [pid 10831:tid 140411565680384] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp11.php
[Mon Mar 16 05:08:04.585839 2026] [access_compat:error] [pid 10831:tid 140411624429312] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file61.php
[Mon Mar 16 05:08:04.781860 2026] [access_compat:error] [pid 10831:tid 140411574073088] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/16.php
[Mon Mar 16 05:08:04.981484 2026] [access_compat:error] [pid 10831:tid 140411641214720] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb.php
[Mon Mar 16 05:08:05.179466 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ss.php
[Mon Mar 16 05:08:05.374864 2026] [access_compat:error] [pid 10831:tid 140411674785536] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/h2.php
[Mon Mar 16 05:08:05.570266 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-p2r3q9c8k4.php
[Mon Mar 16 05:08:05.770476 2026] [access_compat:error] [pid 10831:tid 140411666392832] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ty.php
[Mon Mar 16 05:08:05.971114 2026] [access_compat:error] [pid 10831:tid 140411548894976] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/albin.php
[Mon Mar 16 05:08:06.169200 2026] [access_compat:error] [pid 10831:tid 140411557287680] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Mon Mar 16 05:08:06.676581 2026] [access_compat:error] [pid 10831:tid 140411540502272] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 05:08:08.114046 2026] [access_compat:error] [pid 10709:tid 140411674785536] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fsgdjkl.php
[Mon Mar 16 05:08:08.312081 2026] [access_compat:error] [pid 10709:tid 140411590858496] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/uuu.php
[Mon Mar 16 05:08:08.511760 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/by.php
[Mon Mar 16 05:08:08.720459 2026] [access_compat:error] [pid 10709:tid 140411582465792] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Mon Mar 16 05:08:08.916835 2026] [access_compat:error] [pid 10709:tid 140411649607424] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/asw.php
[Mon Mar 16 05:08:09.111413 2026] [access_compat:error] [pid 10709:tid 140411666392832] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/eee.php
[Mon Mar 16 05:08:09.306562 2026] [access_compat:error] [pid 10709:tid 140411683178240] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lp6.php
[Mon Mar 16 05:08:09.515797 2026] [access_compat:error] [pid 10709:tid 140411699963648] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akses.php
[Mon Mar 16 05:08:09.714118 2026] [access_compat:error] [pid 10709:tid 140411548894976] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/no1.php
[Mon Mar 16 05:08:10.218859 2026] [access_compat:error] [pid 11972:tid 140411708356352] [client 20.203.144.43:50818] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/teee.php
[Mon Mar 16 05:08:10.414801 2026] [access_compat:error] [pid 32654:tid 140411649607424] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Mon Mar 16 05:08:10.609780 2026] [access_compat:error] [pid 32654:tid 140411599251200] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Mon Mar 16 05:08:10.804876 2026] [access_compat:error] [pid 32654:tid 140411708356352] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/kk.php
[Mon Mar 16 05:08:10.999895 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Mon Mar 16 05:08:11.198640 2026] [access_compat:error] [pid 32654:tid 140411624429312] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cs.php
[Mon Mar 16 05:08:11.402470 2026] [access_compat:error] [pid 32654:tid 140411666392832] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/w2025.php
[Mon Mar 16 05:08:11.599534 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/swallowable.php
[Mon Mar 16 05:08:11.799575 2026] [access_compat:error] [pid 32654:tid 140411557287680] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fvvff.php
[Mon Mar 16 05:08:11.994124 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a2.php
[Mon Mar 16 05:08:12.198617 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sty.php
[Mon Mar 16 05:08:12.396467 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/g.php
[Mon Mar 16 05:08:12.595895 2026] [access_compat:error] [pid 32654:tid 140411641214720] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pp.php
[Mon Mar 16 05:08:12.794926 2026] [access_compat:error] [pid 32654:tid 140411716749056] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sys.php
[Mon Mar 16 05:08:12.992068 2026] [access_compat:error] [pid 32654:tid 140411582465792] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Mon Mar 16 05:08:13.188751 2026] [access_compat:error] [pid 32654:tid 140411616036608] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp9.php
[Mon Mar 16 05:08:13.389232 2026] [access_compat:error] [pid 32654:tid 140411658000128] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Mon Mar 16 05:08:13.589579 2026] [access_compat:error] [pid 32654:tid 140411590858496] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wdf.php
[Mon Mar 16 05:08:13.786639 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/2.php
[Mon Mar 16 05:08:13.987104 2026] [access_compat:error] [pid 32654:tid 140411607643904] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wsvvs.php
[Mon Mar 16 05:08:14.180939 2026] [access_compat:error] [pid 32654:tid 140411674785536] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/3.php
[Mon Mar 16 05:12:20.977499 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:60916] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe7ZNSswJuvopo3lOg89AAAAIY"]
[Mon Mar 16 05:12:28.838045 2026] [access_compat:error] [pid 21805:tid 140411565680384] [client 45.3.49.177:50249] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:29.792305 2026] [access_compat:error] [pid 11972:tid 140411582465792] [client 45.3.49.177:63843] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:30.798620 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 45.3.49.177:50063] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:38.255629 2026] [access_compat:error] [pid 21533:tid 140411616036608] [client 209.50.160.105:18677] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:39.234739 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 209.50.160.105:60307] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:40.222165 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 209.50.160.105:16819] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:13:42.706311 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.244.31:60046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe7tglT9VtDQc7bgUx7ogAAAQc"]
[Mon Mar 16 05:15:50.465890 2026] [access_compat:error] [pid 10709:tid 140411557287680] [client 193.233.126.116:59586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:17:37.956073 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.228.16:42748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe8of9ocpUE4ed4uDzKTAAAAhE"]
[Mon Mar 16 05:18:57.760733 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:52564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe88dSswJuvopo3lOg9GAAAAJY"]
[Mon Mar 16 05:22:47.551221 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:57374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe919SswJuvopo3lOg9LwAAAIY"]
[Mon Mar 16 05:24:19.994603 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:38018] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe-M7ABkC4fWIHEf8HF9gAAAEY"]
[Mon Mar 16 05:28:07.926774 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.228.16:32966] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe_F5qj1wV0Si-OkefEzQAAABc"]
[Mon Mar 16 05:29:21.516407 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.244.31:59364] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe_Yf9ocpUE4ed4uDzK0AAAAgA"]
[Mon Mar 16 05:33:11.083558 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.228.16:40682] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfAR46lpbStxTqkSktHbgAAAkk"]
[Mon Mar 16 05:34:06.117116 2026] [access_compat:error] [pid 21805:tid 140411733534464] [client 185.196.111.169:11272] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:38:35.869853 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.228.16:47302] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfBi3bQATo66fKoS7wmXwAAAMc"]
[Mon Mar 16 05:39:47.980914 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.244.31:52452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfB046lpbStxTqkSktHmwAAAkM"]
[Mon Mar 16 05:43:39.740233 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.228.16:45092] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfCu7ABkC4fWIHEf8HHNwAAAFU"]
[Mon Mar 16 05:45:10.723019 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.244.31:44246] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfDFo6lpbStxTqkSktIRAAAAks"]
[Mon Mar 16 05:48:55.048638 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:43108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfD946lpbStxTqkSktIXwAAAkw"]
[Mon Mar 16 05:50:12.004563 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:46880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfERLABkC4fWIHEf8HHdAAAAEM"]
[Mon Mar 16 05:53:27.286190 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 203.100.215.216:53396] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:53:59.986205 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.228.16:51342] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfFJ_9ocpUE4ed4uDzLjAAAAgk"]
[Mon Mar 16 05:55:27.340024 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.244.31:49284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfFf7ABkC4fWIHEf8HHnQAAAFQ"]
[Mon Mar 16 05:59:25.379779 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:48692] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfGbXbQATo66fKoS7wnIgAAAMU"]
[Mon Mar 16 06:00:33.325025 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.244.31:44022] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfGsbABkC4fWIHEf8HHxAAAAE8"]
[Mon Mar 16 06:05:54.930494 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:56970] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfH8tSswJuvopo3lOg-pwAAAIA"]
[Mon Mar 16 06:14:59.644402 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:33738] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfKE46lpbStxTqkSktJfwAAAlM"]
[Mon Mar 16 06:16:26.666331 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:41220] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfKaglT9VtDQc7bgUyDXAAAARQ"]
[Mon Mar 16 06:20:25.917008 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:39648] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfLWXbQATo66fKoS7woCwAAANU"]
[Mon Mar 16 06:21:32.295532 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:33024] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfLnNSswJuvopo3lOg_CgAAAIs"]
[Mon Mar 16 06:25:32.540208 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:59732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfMjJqj1wV0Si-OkefHvQAAAAU"]
[Mon Mar 16 06:26:57.754505 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:34448] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfM4XbQATo66fKoS7wo6QAAAMs"]
[Mon Mar 16 06:30:58.011624 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.228.16:46334] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfN0RXjF1vJNtV6CWrY7QAAAco"]
[Mon Mar 16 06:32:03.138049 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.244.31:36472] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfOE3jZBu2q05ozVU8zlAAAAVY"]
[Mon Mar 16 06:36:05.245320 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.228.16:38552] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfPBbysWC90G-1nBrAkQwAAAY8"]
[Mon Mar 16 06:39:45.211508 2026] [access_compat:error] [pid 21806:tid 140411582465792] [client 170.168.99.127:17437] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:46.435650 2026] [access_compat:error] [pid 10831:tid 140411616036608] [client 193.203.9.125:39645] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:47.851732 2026] [access_compat:error] [pid 10772:tid 140411733534464] [client 193.202.83.82:16155] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:49.600485 2026] [access_compat:error] [pid 21533:tid 140411632822016] [client 185.168.29.109:52169] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:51.111464 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 170.168.96.71:40903] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:52.792767 2026] [access_compat:error] [pid 10772:tid 140411590858496] [client 45.159.21.229:41819] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:54.310666 2026] [access_compat:error] [pid 10651:tid 140411733534464] [client 83.97.117.172:29645] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:55.855934 2026] [access_compat:error] [pid 21946:tid 140411699963648] [client 185.61.222.241:12971] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:57.335639 2026] [access_compat:error] [pid 10709:tid 140411699963648] [client 212.119.47.95:20431] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:58.437904 2026] [access_compat:error] [pid 11972:tid 140411674785536] [client 170.168.96.198:36041] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:40:01.983812 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 170.168.99.154:62895] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:41:29.027010 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.228.16:37054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfQSZqj1wV0Si-OkefIogAAAAk"]
[Mon Mar 16 06:42:32.277113 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:53718] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfQiNSswJuvopo3lOhASQAAAIE"]
[Mon Mar 16 06:46:30.715334 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.228.16:39402] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfRdpqj1wV0Si-OkefI9AAAAAY"]
[Mon Mar 16 06:47:57.971695 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:34614] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfRzXjZBu2q05ozVU80egAAAVg"]
[Mon Mar 16 06:51:47.594265 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.228.16:39038] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfSs5qj1wV0Si-OkefJFwAAABc"]
[Mon Mar 16 06:53:10.025465 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:56252] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfTBtSswJuvopo3lOhA7QAAAJY"]
[Mon Mar 16 06:57:00.018080 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:33606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfT69SswJuvopo3lOhBDQAAAJI"]
[Mon Mar 16 06:58:34.791282 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:37818] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfUStSswJuvopo3lOhBGAAAAJY"]
[Mon Mar 16 07:02:22.122230 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:42780] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfVLo6lpbStxTqkSktMnAAAAlM"]
[Mon Mar 16 07:03:44.550312 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.244.31:57348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfVgHjZBu2q05ozVU81egAAAVI"]
[Mon Mar 16 07:09:28.224845 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.244.31:39774] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfW2P9ocpUE4ed4uDzPLQAAAgI"]
[Mon Mar 16 07:17:55.569845 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.228.16:56704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfY09SswJuvopo3lOhBkgAAAIo"]
[Mon Mar 16 07:20:25.251022 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.244.31:38644] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfZaQlT9VtDQc7bgUyHmwAAAQM"]
[Mon Mar 16 07:23:15.910716 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.228.16:57958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfaE3jZBu2q05ozVU82VAAAAUk"]
[Mon Mar 16 07:25:46.862180 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.244.31:58474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfaqglT9VtDQc7bgUyH1QAAAQI"]
[Mon Mar 16 07:28:20.122476 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:57828] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfbRHbQATo66fKoS7wr6QAAAMw"]
[Mon Mar 16 07:30:51.535345 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.244.31:51102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfb25qj1wV0Si-OkefKlAAAABM"]
[Mon Mar 16 07:33:47.382962 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.228.16:60074] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfci46lpbStxTqkSktOzAAAAk4"]
[Mon Mar 16 07:36:16.191116 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.244.31:59954] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfdIHbQATo66fKoS7wsIQAAAM8"]
[Mon Mar 16 07:38:55.279867 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.228.16:46834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfdv_9ocpUE4ed4uDzQvwAAAg4"]
[Mon Mar 16 07:44:18.156698 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.228.16:51998] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abffABXjF1vJNtV6CWrclAAAAcU"]
[Mon Mar 16 07:46:44.823678 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:52532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfflLABkC4fWIHEf8HNiAAAAEs"]
[Mon Mar 16 07:49:26.550772 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.228.16:44452] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfgNrysWC90G-1nBrAoIQAAAYw"]
[Mon Mar 16 07:51:47.140802 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.244.31:44808] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfgw_9ocpUE4ed4uDzRFQAAAgM"]
[Mon Mar 16 07:54:48.855715 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:41708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfheLABkC4fWIHEf8HOQAAAAFE"]
[Mon Mar 16 07:57:15.905164 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.244.31:59830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfiC5qj1wV0Si-OkefL1wAAAAY"]
[Mon Mar 16 07:59:55.813187 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:49834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfiq3bQATo66fKoS7wtMQAAAMQ"]
[Mon Mar 16 08:00:50.641093 2026] [access_compat:error] [pid 10772:tid 140411599251200] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php-info.php
[Mon Mar 16 08:00:50.858902 2026] [access_compat:error] [pid 10772:tid 140411725141760] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/newinfo.php
[Mon Mar 16 08:00:51.061355 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/siteinfo.php
[Mon Mar 16 08:00:51.447033 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php-info.php
[Mon Mar 16 08:00:51.638976 2026] [access_compat:error] [pid 21805:tid 140411699963648] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/newinfo.php
[Mon Mar 16 08:00:51.842705 2026] [access_compat:error] [pid 21805:tid 140411616036608] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/siteinfo.php
[Mon Mar 16 08:00:55.247930 2026] [access_compat:error] [pid 11972:tid 140411548894976] [client 185.177.72.13:38002] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pageinfo.php
[Mon Mar 16 08:00:55.891914 2026] [access_compat:error] [pid 10772:tid 140411565680384] [client 185.177.72.13:38016] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pageinfo.php
[Mon Mar 16 08:00:59.362378 2026] [access_compat:error] [pid 21533:tid 140411716749056] [client 185.177.72.13:38040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/release_info.php
[Mon Mar 16 08:01:00.054618 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfi7NSswJuvopo3lOhDvQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:01:00.390066 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 185.177.72.13:38044] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/release_info.php
[Mon Mar 16 08:01:03.776639 2026] [access_compat:error] [pid 21805:tid 140411607643904] [client 185.177.72.13:28898] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 08:01:05.223595 2026] [access_compat:error] [pid 10709:tid 140411674785536] [client 185.177.72.13:28908] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 08:01:13.010262 2026] [access_compat:error] [pid 21946:tid 140411641214720] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_info.php
[Mon Mar 16 08:01:13.211973 2026] [access_compat:error] [pid 21946:tid 140411674785536] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_phpinfo.php
[Mon Mar 16 08:01:13.396117 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_info.php
[Mon Mar 16 08:01:13.414648 2026] [access_compat:error] [pid 21946:tid 140411733534464] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dbinfo.php
[Mon Mar 16 08:01:13.596901 2026] [access_compat:error] [pid 11972:tid 140411674785536] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_phpinfo.php
[Mon Mar 16 08:01:13.621800 2026] [access_compat:error] [pid 21946:tid 140411557287680] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_info.php
[Mon Mar 16 08:01:13.804629 2026] [access_compat:error] [pid 11972:tid 140411733534464] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dbinfo.php
[Mon Mar 16 08:01:14.009891 2026] [access_compat:error] [pid 11972:tid 140411725141760] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_info.php
[Mon Mar 16 08:01:15.783809 2026] [access_compat:error] [pid 21946:tid 140411548894976] [client 185.177.72.13:47156] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Mon Mar 16 08:01:15.991215 2026] [access_compat:error] [pid 21946:tid 140411574073088] [client 185.177.72.13:47156] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 08:01:16.099972 2026] [access_compat:error] [pid 21946:tid 140411708356352] [client 185.177.72.13:47160] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Mon Mar 16 08:01:16.310810 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 185.177.72.13:47160] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 08:01:19.949637 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 185.177.72.13:47190] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pinfo.php
[Mon Mar 16 08:01:20.644941 2026] [access_compat:error] [pid 10709:tid 140411590858496] [client 185.177.72.13:47204] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pinfo.php
[Mon Mar 16 08:02:04.019666 2026] [access_compat:error] [pid 10709:tid 140411632822016] [client 185.177.72.13:2632] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 08:02:04.994535 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 185.177.72.13:2638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 08:02:21.976777 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:44894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfjPbABkC4fWIHEf8HOnQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:02:23.286886 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:34930] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfjP7ABkC4fWIHEf8HOoQAAAEI"]
[Mon Mar 16 08:03:13.006619 2026] [access_compat:error] [pid 10831:tid 140411624429312] [client 185.177.72.13:40586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.sample.php
[Mon Mar 16 08:03:13.034181 2026] [access_compat:error] [pid 32654:tid 140411624429312] [client 185.177.72.13:40598] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.sample.php
[Mon Mar 16 08:03:22.506250 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 185.177.72.13:9604] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Mon Mar 16 08:03:22.560567 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 185.177.72.13:9608] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Mon Mar 16 08:04:16.683891 2026] [access_compat:error] [pid 10651:tid 140411733534464] [client 185.177.72.13:15954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 08:04:16.886162 2026] [access_compat:error] [pid 10651:tid 140411574073088] [client 185.177.72.13:15954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Mon Mar 16 08:04:17.018499 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 185.177.72.13:15956] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 08:04:17.211309 2026] [access_compat:error] [pid 21533:tid 140411599251200] [client 185.177.72.13:15956] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Mon Mar 16 08:05:00.190662 2026] [access_compat:error] [pid 11972:tid 140411691570944] [client 185.177.72.13:31106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 08:05:00.297991 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.228.16:34256] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfj3LysWC90G-1nBrApGQAAAY8"]
[Mon Mar 16 08:05:00.340681 2026] [access_compat:error] [pid 32654:tid 140411649607424] [client 185.177.72.13:31122] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 08:06:07.719316 2026] [access_compat:error] [pid 21533:tid 140411590858496] [client 185.177.72.13:44630] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Mon Mar 16 08:06:07.893573 2026] [access_compat:error] [pid 10709:tid 140411574073088] [client 185.177.72.13:44636] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Mon Mar 16 08:07:23.788178 2026] [access_compat:error] [pid 10651:tid 140411666392832] [client 185.177.72.13:53678] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pi.php
[Mon Mar 16 08:07:23.838606 2026] [access_compat:error] [pid 11972:tid 140411716749056] [client 185.177.72.13:53680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pi.php
[Mon Mar 16 08:07:26.132100 2026] [access_compat:error] [pid 10651:tid 140411616036608] [client 185.177.72.13:53684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 08:07:26.133335 2026] [access_compat:error] [pid 32654:tid 140411666392832] [client 185.177.72.13:53688] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 08:07:49.340762 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:55186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfkhbABkC4fWIHEf8HPIwAAAFU"]
[Mon Mar 16 08:08:28.790567 2026] [access_compat:error] [pid 10651:tid 140411674785536] [client 185.177.72.13:24456] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env_copy
[Mon Mar 16 08:08:28.846186 2026] [access_compat:error] [pid 32654:tid 140411658000128] [client 185.177.72.13:24466] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env_copy
[Mon Mar 16 08:10:00.150767 2026] [authz_core:error] [pid 21805:tid 140411725141760] [client 185.177.72.13:38136] AH01630: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess
[Mon Mar 16 08:10:00.367542 2026] [authz_core:error] [pid 21806:tid 140411632822016] [client 185.177.72.13:38148] AH01630: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess
[Mon Mar 16 08:10:45.396948 2026] [access_compat:error] [pid 21806:tid 140411658000128] [client 185.177.72.13:13866] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/123.php
[Mon Mar 16 08:10:48.356970 2026] [access_compat:error] [pid 21805:tid 140411666392832] [client 185.177.72.13:13876] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/123.php
[Mon Mar 16 08:11:33.898018 2026] [access_compat:error] [pid 21946:tid 140411624429312] [client 185.177.72.13:11040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a.php
[Mon Mar 16 08:11:35.835618 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 185.177.72.13:11048] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a.php
[Mon Mar 16 08:12:06.154573 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 185.177.72.13:24890] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adminer.php
[Mon Mar 16 08:12:17.666745 2026] [access_compat:error] [pid 21946:tid 140411691570944] [client 185.177.72.13:57352] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/apache.php
[Mon Mar 16 08:12:37.617849 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:49162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflpbysWC90G-1nBrApiwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:12:38.940350 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:58738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflphXjF1vJNtV6CWreegAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:12:40.783608 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:57262] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqHbQATo66fKoS7wuGQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:42.115345 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:51532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqtSswJuvopo3lOhEuQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:43.281763 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:51540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqxXjF1vJNtV6CWrefQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:45.674614 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:51552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflrbysWC90G-1nBrAplAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:49.030378 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:51560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflsXbQATo66fKoS7wuHQAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:50.243227 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.244.31:42470] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abflsv9ocpUE4ed4uDzScgAAAhI"]
[Mon Mar 16 08:12:51.339106 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:46104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfls7ysWC90G-1nBrApmgAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:59.689240 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflu_9ocpUE4ed4uDzSegAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:13:56.388491 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:46112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9HjZBu2q05ozVU840wAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:13:57.693592 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9XbQATo66fKoS7wuIwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:13:58.894488 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:51590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9rABkC4fWIHEf8HPZgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:00.191931 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:51596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-Jqj1wV0Si-OkefNBQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:01.375337 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:51608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-Zqj1wV0Si-OkefNBgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:02.555032 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:51618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-o6lpbStxTqkSktRYAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:03.845218 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:51622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-_9ocpUE4ed4uDzSgQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:07.045031 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:51626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl_xXjF1vJNtV6CWreiAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:08.320716 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:58298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmANSswJuvopo3lOhEwAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:08.827629 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:36348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAAlT9VtDQc7bgUyLpQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:09.472546 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:58306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAXjZBu2q05ozVU841AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:10.819846 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:58322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAo6lpbStxTqkSktRZAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:11.129908 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:59082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmA46lpbStxTqkSktRZQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:12.141018 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:58336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBHbQATo66fKoS7wuJgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:12.458487 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:33728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBLysWC90G-1nBrAp4gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:13.462739 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:58344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBQlT9VtDQc7bgUyLpgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:14.756744 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:58358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBhXjF1vJNtV6CWreiQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:14.794963 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:33738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBglT9VtDQc7bgUyLqAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:16.047061 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:58370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCP9ocpUE4ed4uDzSggAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:17.151648 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCRXjF1vJNtV6CWrejAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:18.325009 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:58374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCv9ocpUE4ed4uDzShAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:18.462898 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCv9ocpUE4ed4uDzShQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:19.587474 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:57674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmC9SswJuvopo3lOhEwQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:19.676977 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:33766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmC3jZBu2q05ozVU842AAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:20.878549 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:57676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDHjZBu2q05ozVU842QAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:22.015826 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:57682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDhXjF1vJNtV6CWrejQAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:22.060471 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:46122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDnjZBu2q05ozVU842wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:23.280472 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:57692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmD3bQATo66fKoS7wuKAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:23.342966 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmD5qj1wV0Si-OkefNCQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:24.577636 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:57696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEJqj1wV0Si-OkefNCgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:25.588770 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:46138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEZqj1wV0Si-OkefNDAAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:25.914185 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEbABkC4fWIHEf8HPaQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:27.219701 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:57720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmE7ABkC4fWIHEf8HPagAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:27.909655 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:46146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmE5qj1wV0Si-OkefNDgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:28.453122 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:52058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFP9ocpUE4ed4uDzShwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:29.102996 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:52062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFRXjF1vJNtV6CWrekAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:30.255654 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:46154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFrABkC4fWIHEf8HPbAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:30.711319 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:52076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFo6lpbStxTqkSktRaAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:32.226392 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:52086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGHbQATo66fKoS7wuLAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:32.623018 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:38200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGHbQATo66fKoS7wuLQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:33.810781 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:52094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGXjZBu2q05ozVU843QAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:34.992030 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:38208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGnbQATo66fKoS7wuLwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:35.284950 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:52104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmG_9ocpUE4ed4uDzSiQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:36.315589 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:38216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHP9ocpUE4ed4uDzSigAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:36.867407 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:52120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHBXjF1vJNtV6CWrelQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:37.593683 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:38220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHRXjF1vJNtV6CWrelgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:38.782573 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:38228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHo6lpbStxTqkSktRaQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:39.980000 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:54772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmH3jZBu2q05ozVU844AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:41.584238 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:38240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIQlT9VtDQc7bgUyLqwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:42.887099 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:33838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIv9ocpUE4ed4uDzSjAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:42.988842 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:54784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIhXjF1vJNtV6CWremgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:45.235736 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJZqj1wV0Si-OkefNEQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:46.531713 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:33858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJpqj1wV0Si-OkefNEwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:46.952044 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJv9ocpUE4ed4uDzSjwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:48.371376 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:59530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKLABkC4fWIHEf8HPbwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:48.847546 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:33868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKAlT9VtDQc7bgUyLrQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:49.689153 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:59534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKXjZBu2q05ozVU845wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:50.206332 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:39044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKnjZBu2q05ozVU846QAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:52.037899 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:59548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLNSswJuvopo3lOhEygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:52.541579 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:39060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLHbQATo66fKoS7wuNAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:53.794702 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:39064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLbABkC4fWIHEf8HPcQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:54.973263 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLrysWC90G-1nBrAp_QAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:56.108799 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:39082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmMAlT9VtDQc7bgUyLrgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:58.383491 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:39084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmMnbQATo66fKoS7wuOAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:01.415064 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:39100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNLABkC4fWIHEf8HPcwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:02.675397 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:59552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNnjZBu2q05ozVU84_QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:02.871890 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:57064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNglT9VtDQc7bgUyLrwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:03.963821 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:54902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmN9SswJuvopo3lOhEywAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:05.226196 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:54904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmOY6lpbStxTqkSktRbQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:06.363476 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:57072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmOv9ocpUE4ed4uDzSlAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:07.683466 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:54908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmO46lpbStxTqkSktRcAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:09.721052 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:57082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPQlT9VtDQc7bgUyLtAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:11.034982 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:40690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPwlT9VtDQc7bgUyLtgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:11.087255 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:53820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPwlT9VtDQc7bgUyLtwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:12.167383 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:40704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQBXjF1vJNtV6CWrenwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:12.387756 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:53836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQLABkC4fWIHEf8HPdAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:14.498878 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:40708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQhXjF1vJNtV6CWreoQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:16.648129 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:53848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmRAlT9VtDQc7bgUyLvQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:19.876176 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:53864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmR3bQATo66fKoS7wuOwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:21.221878 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.241.46:48434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmSQlT9VtDQc7bgUyLvgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:27.818065 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:48446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmTxXjF1vJNtV6CWreqAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:29.110925 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:48898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmUQlT9VtDQc7bgUyLwAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:30.283358 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmUrABkC4fWIHEf8HPdQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:31.575544 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:48908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmU9SswJuvopo3lOhEzwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:34.667244 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:40716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmVrysWC90G-1nBrAqEAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:36.886773 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:48912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWAlT9VtDQc7bgUyLxwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:37.048840 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:53608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWRXjF1vJNtV6CWreqwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:38.232460 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:53222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWrABkC4fWIHEf8HPdgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:40.466544 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:53228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmXHbQATo66fKoS7wuPQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:41.756117 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:53242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmXbysWC90G-1nBrAqEQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:45.641241 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmYbysWC90G-1nBrAqFAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:46.964746 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:53254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmYpqj1wV0Si-OkefNGwAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:54.720241 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:36500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmapqj1wV0Si-OkefNJAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:56.046988 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:36512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbNSswJuvopo3lOhE0wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:57.576459 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:36518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbf9ocpUE4ed4uDzSlwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:58.806989 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:48360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbo6lpbStxTqkSktReAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:00.063997 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:48372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcI6lpbStxTqkSktReQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:01.364223 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:48376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcY6lpbStxTqkSktRegAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:02.715179 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:48390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcnjZBu2q05ozVU85MQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:03.982885 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:48402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmc7ysWC90G-1nBrAqFQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:06.159659 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.241.46:48406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmdglT9VtDQc7bgUyLywAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:10.889165 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:48412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmev9ocpUE4ed4uDzSnAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:12.206592 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmfLABkC4fWIHEf8HPmwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:15.813836 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:34954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmfwlT9VtDQc7bgUyLzgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:17.155240 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:34958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgRXjF1vJNtV6CWrerQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:18.271280 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgrABkC4fWIHEf8HPoQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:18.583006 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:54082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgrABkC4fWIHEf8HPogAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:19.776166 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:54092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmg5qj1wV0Si-OkefNKAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:21.133892 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhf9ocpUE4ed4uDzSnQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:22.207585 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:36610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhpqj1wV0Si-OkefNKwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:22.506670 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:54108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmho6lpbStxTqkSktRfQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:23.459949 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:35576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmh_9ocpUE4ed4uDzSnwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:23.720848 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:54122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhxXjF1vJNtV6CWrergAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:24.992574 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:54124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiHbQATo66fKoS7wuQgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:25.918993 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:35588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiQlT9VtDQc7bgUyL0wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:26.371057 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:54126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiglT9VtDQc7bgUyL1AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:27.578113 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:54132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmi7ABkC4fWIHEf8HPowAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:32.683757 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:35592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmkAlT9VtDQc7bgUyL3QAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:35.835655 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:40024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmkwlT9VtDQc7bgUyL4AAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:36.183925 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:44656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlHjZBu2q05ozVU85TQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:37.152342 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:40026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlZqj1wV0Si-OkefNLAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:38.503931 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:50202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlnbQATo66fKoS7wuRQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:39.666500 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:44668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfml3bQATo66fKoS7wuRwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:40.890950 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:50216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmmBXjF1vJNtV6CWresAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:43.268525 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:50226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmm46lpbStxTqkSktRfwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:43.373345 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:44814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmm3bQATo66fKoS7wuSgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:44.672232 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:44822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmnP9ocpUE4ed4uDzSoQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:46.911351 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:50228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmnv9ocpUE4ed4uDzSpAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:50.336679 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:44838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmotSswJuvopo3lOhE2wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:51.335198 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:33730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmo7ysWC90G-1nBrAqGwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:53.735856 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:33736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmpXjZBu2q05ozVU85XAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:54.832301 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmprABkC4fWIHEf8HPrAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:57.270371 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:52234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqZqj1wV0Si-OkefNLwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:58.151622 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:33744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqo6lpbStxTqkSktRhAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:58.626391 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqhXjF1vJNtV6CWreswAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:59.462848 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:57790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmq9SswJuvopo3lOhE3AAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:00.823187 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:57792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmrNSswJuvopo3lOhE3gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:04.334239 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:57798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmsJqj1wV0Si-OkefNMwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:05.613808 2026] [mime_magic:error] [pid 21805:tid 140411632822016] (70014)End of file found: [client 74.7.241.46:57808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/fs
[Mon Mar 16 08:17:06.135420 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:52252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmstSswJuvopo3lOhE5AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:08.555944 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:36538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmtLysWC90G-1nBrAqHgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:10.917844 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:36544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmtrysWC90G-1nBrAqIAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:12.395953 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:57816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmuAlT9VtDQc7bgUyL6AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:16.453217 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:45738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmvLABkC4fWIHEf8HPxAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:20.077616 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmv5qj1wV0Si-OkefNOgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:22.483025 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:58132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmwo6lpbStxTqkSktRhwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:24.810497 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:58142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmxP9ocpUE4ed4uDzSqQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:26.179674 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:58144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmxhXjF1vJNtV6CWretgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:27.459161 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:58154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmx9SswJuvopo3lOhE6AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:31.939076 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:45742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmy7ysWC90G-1nBrAqLgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:33.211975 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:38538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmzf9ocpUE4ed4uDzSqgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:37.738923 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:38544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm0Y6lpbStxTqkSktRjQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:39.063247 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:38550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm046lpbStxTqkSktRjgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:40.403977 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:35210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm1Jqj1wV0Si-OkefNSQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:41.764347 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:40288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm1dSswJuvopo3lOhE6gAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:43.362554 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:48548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm13bQATo66fKoS7wuVQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:44.167911 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:40302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2AlT9VtDQc7bgUyL8AAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:45.450086 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:40304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2Zqj1wV0Si-OkefNSgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:45.800016 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2XjZBu2q05ozVU85YwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:48.115597 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:48560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3P9ocpUE4ed4uDzSrwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:49.060348 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:40314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3f9ocpUE4ed4uDzSsQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:51.603471 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:48570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3xXjF1vJNtV6CWrevQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:52.930501 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:50612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm4Jqj1wV0Si-OkefNSwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:54.231780 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:50616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm4tSswJuvopo3lOhE7AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:55.119735 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:37934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm43jZBu2q05ozVU85aAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:55.537449 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm47ABkC4fWIHEf8HP5QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:55.787097 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm47ABkC4fWIHEf8HP5gAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:57.476220 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:37948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm5QlT9VtDQc7bgUyL8gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:58.739085 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:36080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm5rysWC90G-1nBrAqMAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:00.871808 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:36092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm6HbQATo66fKoS7wuWAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:11.055793 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:50628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm8_9ocpUE4ed4uDzSvwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:12.377148 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm9I6lpbStxTqkSktRkwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:14.671735 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:54816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm9pqj1wV0Si-OkefNTwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:15.113040 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:36106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm93bQATo66fKoS7wuZgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:15.954265 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:54820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm99SswJuvopo3lOhE7gAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:20.527621 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm_NSswJuvopo3lOhE8gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:20.704914 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:59476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm_AlT9VtDQc7bgUyL_AAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:25.065221 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:48008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnAbysWC90G-1nBrAqNgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:26.400095 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:48024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnAnbQATo66fKoS7wuZwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:27.602443 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:48030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnA46lpbStxTqkSktRlwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:28.750039 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:42864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnBHbQATo66fKoS7wuaAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:33.204346 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:42868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnCdSswJuvopo3lOhE9gAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:33.393823 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:58812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnCRXjF1vJNtV6CWrezQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:35.586833 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnC5qj1wV0Si-OkefNUgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:35.672288 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:47916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnC7ysWC90G-1nBrAqOAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:37.013284 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:47928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnDdSswJuvopo3lOhE-AAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:41.559111 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:47936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnEY6lpbStxTqkSktRnAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:43.347003 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:42892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnExXjF1vJNtV6CWre2QAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:43.954411 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:50166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnExXjF1vJNtV6CWre2gAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:49.451494 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:50182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnGQlT9VtDQc7bgUyMAwAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:51.191402 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:50370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnG9SswJuvopo3lOhFAQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:54.515272 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:40098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnHpqj1wV0Si-OkefNXQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:01.613594 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:40108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnJQlT9VtDQc7bgUyMCgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:08.483723 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:49970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnLAlT9VtDQc7bgUyMDgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:09.577883 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:44114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnLZqj1wV0Si-OkefNbQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:22.183231 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:49972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnOglT9VtDQc7bgUyMKQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:30.057431 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:53386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnQglT9VtDQc7bgUyMMgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:34.295704 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:42858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnRv9ocpUE4ed4uDzS0wAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:37.491614 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:48026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnSY6lpbStxTqkSktRqgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:38.884705 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:39364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnSrysWC90G-1nBrAqSQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:40.275628 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:39376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnTBXjF1vJNtV6CWre5gAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:48.257984 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:39448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVJqj1wV0Si-OkefNgQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:48.340211 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:39384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVHbQATo66fKoS7wufAAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:50.686533 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVhXjF1vJNtV6CWre7AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:51.814530 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:52392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnV9SswJuvopo3lOhFDgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:53.181044 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:52398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnWXjZBu2q05ozVU85ngAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:54.567160 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:52400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnWtSswJuvopo3lOhFDwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:59.042765 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:52416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnXwlT9VtDQc7bgUyMOwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:04.423017 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:42892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnZJqj1wV0Si-OkefNhgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:05.715667 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:42898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnZZqj1wV0Si-OkefNhwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:08.615470 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnaHbQATo66fKoS7wumAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:09.919226 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:59976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnaXjZBu2q05ozVU85tAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:13.781616 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.228.16:41072] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfnbXjZBu2q05ozVU85wAAAAVY"]
[Mon Mar 16 08:20:17.721445 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:42906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfncXjZBu2q05ozVU85ywAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:22.436902 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:35654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfndpqj1wV0Si-OkefNjAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:28.410575 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:35664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnfLysWC90G-1nBrAqXQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:31.809652 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:39582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnf3jZBu2q05ozVU854gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:33.093787 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:51676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfngRXjF1vJNtV6CWre7gAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:45.387404 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:39542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnjQlT9VtDQc7bgUyMXAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:48.462687 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:39092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnkJqj1wV0Si-OkefNkAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:50.815582 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:33898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnktSswJuvopo3lOhFFAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:55.348721 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:33908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnl_9ocpUE4ed4uDzS4QAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:57.664690 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:33920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnmdSswJuvopo3lOhFFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:58.920410 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:55588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnmpqj1wV0Si-OkefNlAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:00.176491 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:51686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnnAlT9VtDQc7bgUyMawAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:03.755652 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:55600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnn3bQATo66fKoS7wuoQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:05.124116 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:55608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnoY6lpbStxTqkSktRtAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:10.790335 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:55620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnpv9ocpUE4ed4uDzS5wAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:12.839126 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:54022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnqAlT9VtDQc7bgUyMeQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:16.432282 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnrBXjF1vJNtV6CWre9AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:21.952018 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:36810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnsXbQATo66fKoS7wusgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:26.581414 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:43424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfntnbQATo66fKoS7wuvAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:27.865081 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:49030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnt3bQATo66fKoS7wuvgAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:27.891328 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:43434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnt_9ocpUE4ed4uDzS6gAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:29.200984 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:33392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnuXbQATo66fKoS7wuvwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:32.474626 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:43442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnvBXjF1vJNtV6CWre-QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:35.915883 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:60332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnv5qj1wV0Si-OkefNmwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:37.182702 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:60348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnwRXjF1vJNtV6CWre-gAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:38.549596 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:60360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnwo6lpbStxTqkSktRuQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:42.203765 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:60366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnxglT9VtDQc7bgUyMfAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:45.215501 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:33404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnyf9ocpUE4ed4uDzS-gAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:46.515120 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:44102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnyo6lpbStxTqkSktRugAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:49.060695 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:37702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnzXbQATo66fKoS7wuygAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:50.223454 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:38594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnzhXjF1vJNtV6CWre_gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:54.666738 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn0njZBu2q05ozVU86EAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:57.018178 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:53708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn1bysWC90G-1nBrAqZwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:57.924950 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:38600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn1QlT9VtDQc7bgUyMgwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:21:59.232229 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:45296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn146lpbStxTqkSktRvAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:03.905453 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:53716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn27ysWC90G-1nBrAqbQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:05.153073 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:54008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn3bysWC90G-1nBrAqcAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:05.633197 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:45308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn3dSswJuvopo3lOhFJAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:07.968275 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:45316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn37ysWC90G-1nBrAqdQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:09.023796 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:54016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn4bysWC90G-1nBrAqdgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:22:10.399327 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:56908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn4hXjF1vJNtV6CWrfAQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:11.775431 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:56916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn45qj1wV0Si-OkefNnQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:17.464263 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:36896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn6dSswJuvopo3lOhFLQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:20.681557 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:56924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn7Jqj1wV0Si-OkefNpAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:28.256057 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:58358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn9I6lpbStxTqkSktRxwAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:29.981991 2026] [mime_magic:error] [pid 21533:tid 140411641214720] (70014)End of file found: [client 74.7.243.203:36900] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/cache/man
[Mon Mar 16 08:22:30.648862 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:44322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn9pqj1wV0Si-OkefNpgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:34.086575 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn-o6lpbStxTqkSktRywAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:50.940708 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.244.31:52726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfoCo6lpbStxTqkSktRzAAAAkc"]
[Mon Mar 16 08:22:53.183444 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:44334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoDRXjF1vJNtV6CWrfUwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:55.398955 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoDQlT9VtDQc7bgUyMqgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:22:56.400473 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:57052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoEHjZBu2q05ozVU86IQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:58.807580 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:57068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoEo6lpbStxTqkSktRzgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:00.133265 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:59178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFAlT9VtDQc7bgUyMqwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:01.441885 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:59192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFQlT9VtDQc7bgUyMrAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:02.723692 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:59200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFglT9VtDQc7bgUyMrwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:04.062750 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:59206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoGHjZBu2q05ozVU86IgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:08.607326 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:59222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoHI6lpbStxTqkSktR0gAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:09.927212 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:50982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoHZqj1wV0Si-OkefNqAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:11.837233 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:35536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoH7ABkC4fWIHEf8HQtgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:12.242912 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:50994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoII6lpbStxTqkSktR1wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:15.223520 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:50996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoI9SswJuvopo3lOhFMQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:16.608965 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:51004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoJBXjF1vJNtV6CWrfVAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:17.932680 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:51012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoJRXjF1vJNtV6CWrfVQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:21.104162 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:45822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKdSswJuvopo3lOhFNwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:21.199466 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:57708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKRXjF1vJNtV6CWrfWAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:22.511142 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.241.46:57724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKnbQATo66fKoS7wu0gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:23.802977 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:57736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoK46lpbStxTqkSktR2AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:26.167544 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:57752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoLglT9VtDQc7bgUyMugAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:26.711440 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:34996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoLglT9VtDQc7bgUyMvAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:27.524917 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:57764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoL3jZBu2q05ozVU86JQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:32.121353 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:53106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoNAlT9VtDQc7bgUyMxAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:41.643087 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:35002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoPbABkC4fWIHEf8HQ0gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:56.725326 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:55348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoTLABkC4fWIHEf8HQ4AAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:10.980872 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:53122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoWnbQATo66fKoS7wvCAAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:24:17.039464 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:52302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoYXbQATo66fKoS7wvFQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:18.350471 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:34420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoYglT9VtDQc7bgUyM5gAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:35.087550 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:34426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfocxXjF1vJNtV6CWrfbQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:36.401516 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:43526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfodHjZBu2q05ozVU86KwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:37.790479 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:43542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfodY6lpbStxTqkSktR3gAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:53.466857 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:43550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfohbysWC90G-1nBrAqlwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:54.735473 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfohglT9VtDQc7bgUyNAwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:56.047373 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:32862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoiAlT9VtDQc7bgUyNBQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:57.368308 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:32870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoiY6lpbStxTqkSktR4gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:10.189437 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:44778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfolnbQATo66fKoS7wvSAAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:25:11.501371 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:46674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfolwlT9VtDQc7bgUyNEwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:13.710320 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:46686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfomY6lpbStxTqkSktR8wAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:14.221087 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:45146] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfomrABkC4fWIHEf8HQ6AAAAEg"]
[Mon Mar 16 08:25:16.328599 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:46700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfonJqj1wV0Si-OkefNtAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:22.151214 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:32880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfooo6lpbStxTqkSktR_AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:24.557794 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:48456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfopP9ocpUE4ed4uDzTKQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:25.890321 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:48468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfopQlT9VtDQc7bgUyNIgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:27.258432 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:48480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfop46lpbStxTqkSktR_gAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:28.552790 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoqLysWC90G-1nBrAqmQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:29.845550 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:48498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoqXbQATo66fKoS7wvSQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:31.180072 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:59994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoq9SswJuvopo3lOhFQQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:32.326541 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:60004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforHjZBu2q05ozVU86NQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:34.622700 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:46706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforf9ocpUE4ed4uDzTMQAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:25:35.936104 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.241.46:46342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforxXjF1vJNtV6CWrfcgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:37.238663 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:46344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfosbABkC4fWIHEf8HQ7AAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:38.533518 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:51924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfospqj1wV0Si-OkefNuQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:38.847380 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:60018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfosnbQATo66fKoS7wvUAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:40.168957 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:34482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfotHjZBu2q05ozVU86OQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:41.488988 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfotZqj1wV0Si-OkefNugAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:44.875417 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:34506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfouLysWC90G-1nBrAqoQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:46.188468 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:34512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfounjZBu2q05ozVU86OgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:47.564795 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfou3jZBu2q05ozVU86OwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:50.039337 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:34522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfovo6lpbStxTqkSktSAQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:51.369155 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:43468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfovxXjF1vJNtV6CWrfdwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:53.819665 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:43476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfowXbQATo66fKoS7wvUwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:55.103292 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:43492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfow46lpbStxTqkSktSAgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:58.446569 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:43506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoxglT9VtDQc7bgUyNMwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:59.812043 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:43514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfox9SswJuvopo3lOhFVwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:01.358386 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:39408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoybysWC90G-1nBrAqrgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:02.660520 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:39416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoyo6lpbStxTqkSktSCQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:03.858734 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:51926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoy9SswJuvopo3lOhFWQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:03.952776 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:39424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoy3bQATo66fKoS7wvVAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:05.144431 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:39434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfozRXjF1vJNtV6CWrfewAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:05.194543 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:34686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfozRXjF1vJNtV6CWrffAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:06.370292 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:34690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoznjZBu2q05ozVU86PwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:07.464549 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:39436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoz5qj1wV0Si-OkefNwQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:08.785965 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:39442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo0AlT9VtDQc7bgUyNOQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:10.094971 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:39454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo0glT9VtDQc7bgUyNPQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:13.322407 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:56294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo1bysWC90G-1nBrAquwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:17.725865 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:56304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo2QlT9VtDQc7bgUyNSwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:22.581370 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:56312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo3pqj1wV0Si-OkefN0wAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:24.536321 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:52512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo33bQATo66fKoS7wvVwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:25.899168 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:52528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo4XbQATo66fKoS7wvWQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:27.793136 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:34692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo4wlT9VtDQc7bgUyNWAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:26:28.239177 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:52538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo5P9ocpUE4ed4uDzTNwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:29.590399 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo5bABkC4fWIHEf8HQ9AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:31.237053 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:34404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo546lpbStxTqkSktSDgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:31.908086 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:50016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo53jZBu2q05ozVU86QwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:34.243036 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:50024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo6hXjF1vJNtV6CWrfgAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:00.543089 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:34416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpBP9ocpUE4ed4uDzTUgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:03.883228 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:33618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpB46lpbStxTqkSktSLwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:08.357555 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:33624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpDI6lpbStxTqkSktSOQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:09.575063 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:57964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpDQlT9VtDQc7bgUyNYwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:18.643904 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:57966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpFglT9VtDQc7bgUyNawAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:20.980246 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:42940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpGI6lpbStxTqkSktSRgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:22.868629 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:50030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpGo6lpbStxTqkSktSSAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:27.595694 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.241.46:42946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpHxXjF1vJNtV6CWrfigAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:28.433601 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpILABkC4fWIHEf8HRBQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:30.787740 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpInjZBu2q05ozVU86UAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:34.557980 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:47410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpJglT9VtDQc7bgUyNcgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:35.851479 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:47426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpJ3jZBu2q05ozVU86UQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:41.349060 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:47434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpLXjZBu2q05ozVU86VgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:51.738173 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:45496] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfpN5qj1wV0Si-OkefN3AAAABA"]
[Mon Mar 16 08:28:06.099401 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:59878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpRrysWC90G-1nBrArLgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:16.377261 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:56550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpUJqj1wV0Si-OkefN4wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:26.531313 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:54588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpWhXjF1vJNtV6CWrfnAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:29.949243 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:37756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpXXbQATo66fKoS7wvbwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:31.252855 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:38834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpX_9ocpUE4ed4uDzTWwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:32.541864 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:38836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYLABkC4fWIHEf8HRCwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:33.362008 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:59372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYdSswJuvopo3lOhFqwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:28:33.803016 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:38844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYXbQATo66fKoS7wvcwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:37.831210 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpZXbQATo66fKoS7wvfAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:21.538789 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpkZqj1wV0Si-OkefOFAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:22.831932 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:44490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpknjZBu2q05ozVU86aAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:26.645417 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:35880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfplglT9VtDQc7bgUyNswAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:29.072055 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:43224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpmY6lpbStxTqkSktSWwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:33.655572 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:54092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpndSswJuvopo3lOhFswAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:34.997431 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:54102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpno6lpbStxTqkSktSZAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:37.164219 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpoXjZBu2q05ozVU86awAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:42.587477 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpprABkC4fWIHEf8HRGAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:43.915411 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:35780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpp3jZBu2q05ozVU86bQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:44.871502 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:44502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpqP9ocpUE4ed4uDzTdQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:54.686433 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:34834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpsnbQATo66fKoS7wvmgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:59.121309 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:38852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpt3jZBu2q05ozVU86cQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:03.855540 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:57160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpu3jZBu2q05ozVU86dQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:15.027835 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.228.16:38958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfpx46lpbStxTqkSktSkAAAAkg"]
[Mon Mar 16 08:30:17.927656 2026] [mime_magic:error] [pid 21946:tid 140411658000128] (70014)End of file found: [client 74.7.241.46:35786] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Mon Mar 16 08:30:27.916302 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:57176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp03bQATo66fKoS7wvzQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:32.542192 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:48002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp2AlT9VtDQc7bgUyNugAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:35.019482 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp2xXjF1vJNtV6CWrfuwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:35.063297 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:39998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp246lpbStxTqkSktSmAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:38.510983 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:37060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp3glT9VtDQc7bgUyNwwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:39.544275 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:40012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp3wlT9VtDQc7bgUyNxQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:43.319863 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:34562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp4XbQATo66fKoS7wv0QAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:45.494007 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:41478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp5XjZBu2q05ozVU86kAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:45.847055 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:34574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp5RXjF1vJNtV6CWrfwAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:50.197994 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:41492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp6rysWC90G-1nBrArnAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:51.613426 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:56944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp65qj1wV0Si-OkefOJgAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:58.419716 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:56946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp8rABkC4fWIHEf8HRLAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:00.874986 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:51944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp9LysWC90G-1nBrArngAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:11.947670 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:51956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp_3bQATo66fKoS7wv6gAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:41.381354 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqHdSswJuvopo3lOhF8QAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:31:46.266119 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:41450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqIo6lpbStxTqkSktSsgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:32:10.616081 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqOrysWC90G-1nBrAr2gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:14.119766 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:46698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqPhXjF1vJNtV6CWrf2wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:21.618920 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:46710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqRZqj1wV0Si-OkefOUwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:22.950955 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:43440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqRhXjF1vJNtV6CWrf3gAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:26.264102 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqSo6lpbStxTqkSktSvAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:31.195618 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:43458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqT_9ocpUE4ed4uDzTrAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:54.859598 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.244.31:34332] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfqZpqj1wV0Si-OkefOYQAAAAA"]
[Mon Mar 16 08:33:20.269076 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:41462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqgLABkC4fWIHEf8HRmAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:23.674548 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:52300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqg3bQATo66fKoS7wweAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:25.027021 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:52312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqhXbQATo66fKoS7wwewAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:33.936366 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqjbABkC4fWIHEf8HRoQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:37.021915 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:36136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqkQlT9VtDQc7bgUyOLwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:49.291372 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:36138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqnbABkC4fWIHEf8HRsQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:50.578853 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:55168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqno6lpbStxTqkSktS3gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:53.986592 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:55172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqobABkC4fWIHEf8HRtgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:34:19.386980 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:39630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqu3bQATo66fKoS7ww5wAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:20.711104 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:43078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqvJqj1wV0Si-OkefOcAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:22.950698 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:43088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqvnjZBu2q05ozVU87BgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:26.371081 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:43102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqwnjZBu2q05ozVU87CwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:47.967433 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:43114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq13jZBu2q05ozVU87JgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:49.299374 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:41774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq2dSswJuvopo3lOhGMgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:57.656871 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:41776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq4Zqj1wV0Si-OkefOjwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:35:19.980699 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.228.16:39694] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfq93jZBu2q05ozVU87KAAAAUc"]
[Mon Mar 16 08:35:25.522562 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:55174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq_RXjF1vJNtV6CWrgSgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:35:37.588366 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:47766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrCZqj1wV0Si-OkefOogAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:35:49.169691 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:58240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrFbysWC90G-1nBrAsOAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:36:00.171165 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:56150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrIHbQATo66fKoS7wxSQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:37:31.799187 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:57738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfre5qj1wV0Si-OkefPHwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:37:54.651339 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.244.31:39700] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfrkpqj1wV0Si-OkefPLgAAAAE"]
[Mon Mar 16 08:38:20.903294 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrrI6lpbStxTqkSktTMwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:35.263199 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:45982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfruxXjF1vJNtV6CWrgeAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:55.559249 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:40580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrz7ysWC90G-1nBrAsbgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:57.983561 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:33066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr0Zqj1wV0Si-OkefPfwAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:59.295460 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr05qj1wV0Si-OkefPggAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:39:40.101644 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:46574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr_AlT9VtDQc7bgUyPWgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:40:20.799381 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:57294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfsJHjZBu2q05ozVU87mgAAAVE"]
[Mon Mar 16 08:41:11.828623 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:58246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsV3jZBu2q05ozVU870wAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 08:41:30.023941 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsanbQATo66fKoS7wyAQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:41:32.377869 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:38092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsbLABkC4fWIHEf8HSegAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:42:45.339598 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:38098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfstbABkC4fWIHEf8HSyAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:42:45.415639 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:36884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfstY6lpbStxTqkSktUKAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:42:49.026906 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:43892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsuXbQATo66fKoS7wyGAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:43:24.013266 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:56236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfs3AlT9VtDQc7bgUyPwwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:04.539296 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:38580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftBP9ocpUE4ed4uDzU5QAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:18.622170 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:44242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftEo6lpbStxTqkSktUegAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:26.111500 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:35506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftGv9ocpUE4ed4uDzU-gAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:44:49.751415 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:55742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftMY6lpbStxTqkSktUmQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:54.311749 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:38756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftNrABkC4fWIHEf8HS-QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:44:55.651428 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:38762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftN_9ocpUE4ed4uDzVBQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:10.247528 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:38766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftRo6lpbStxTqkSktUpwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:45:21.075239 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.228.16:52534] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abftUZqj1wV0Si-OkefQOAAAAAA"]
[Mon Mar 16 08:45:42.630062 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:59390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftZdSswJuvopo3lOhG6gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:48.184023 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:51720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftbNSswJuvopo3lOhG7wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:59.237259 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:51730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftdwlT9VtDQc7bgUyQIQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:01.688971 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:59152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfteXbQATo66fKoS7wyYgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:35.562250 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:59160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftm_9ocpUE4ed4uDzVPAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:36.864484 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:40150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftnP9ocpUE4ed4uDzVPQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:02.305985 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:40158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftthXjF1vJNtV6CWrhMAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:06.576181 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:54044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftuo6lpbStxTqkSktVJgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:47:40.803038 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:44254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft3AlT9VtDQc7bgUyQYwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:47:53.251632 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:52446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft6XbQATo66fKoS7wymAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:57.154391 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.244.31:52598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abft7bABkC4fWIHEf8HTMAAAAEA"]
[Mon Mar 16 08:48:03.387335 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:37078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft8_9ocpUE4ed4uDzVWAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:05.872535 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:53418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft9Y6lpbStxTqkSktVLQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:08.295407 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft-LysWC90G-1nBrAtrQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:25.566631 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:35186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuCbABkC4fWIHEf8HTQwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:48:32.315519 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:47492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuEHbQATo66fKoS7wyqQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:38.721646 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:42018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuFnjZBu2q05ozVU88dQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:44.803099 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:51706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuHNSswJuvopo3lOhHyAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:54.967239 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:46902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuJglT9VtDQc7bgUyQnQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:28.115425 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:55804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuSAlT9VtDQc7bgUyQ0QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:49:37.279602 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:40760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuUXbQATo66fKoS7wy-gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:39.839232 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:46844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuUxXjF1vJNtV6CWrhXgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:53.747575 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:46154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuYY6lpbStxTqkSktVWwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:03.571182 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:46846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfua3jZBu2q05ozVU88ywAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:06.199829 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:32790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfubglT9VtDQc7bgUyQ6AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:07.311534 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:54088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfubwlT9VtDQc7bgUyQ6QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:08.616844 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:48642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfucAlT9VtDQc7bgUyQ7AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:09.973857 2026] [mime_magic:error] [pid 21533:tid 140411666392832] (70014)End of file found: [client 74.7.241.46:48648] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib
[Mon Mar 16 08:50:11.787113 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.241.46:48662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuc3bQATo66fKoS7wzCgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:14.768961 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:48666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfudpqj1wV0Si-OkefQhQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:16.386598 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:48676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfueHbQATo66fKoS7wzDwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:20.974887 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:48690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfufAlT9VtDQc7bgUyQ_AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:22.551158 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:51510] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfufnjZBu2q05ozVU884QAAAUw"]
[Mon Mar 16 08:50:29.326798 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:47806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuhLysWC90G-1nBrAt2wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:30.684374 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:34594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuho6lpbStxTqkSktVYAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:31.479638 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:46230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuh3bQATo66fKoS7wzGwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:31.849476 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:34596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuh3bQATo66fKoS7wzHAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:43.223404 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:34596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuk3bQATo66fKoS7wzKgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:19.435420 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:45696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfut_9ocpUE4ed4uDzVvwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:22.875417 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:55666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuuv9ocpUE4ed4uDzVwgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:25.415065 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuvdSswJuvopo3lOhIMwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:28.555041 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:55670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuwNSswJuvopo3lOhIPwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:52.396411 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2NSswJuvopo3lOhIYwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:52.488046 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:44588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2NSswJuvopo3lOhIZAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:51:54.787504 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:34928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2tSswJuvopo3lOhIaAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:59.485482 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:34934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu3xXjF1vJNtV6CWrhfwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:01.864520 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:57170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu4Zqj1wV0Si-OkefQugAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:04.627541 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:57176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu5P9ocpUE4ed4uDzVzQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:10.885980 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:35036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu6rysWC90G-1nBrAuEgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:14.303594 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:42394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu7hXjF1vJNtV6CWrhjAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:40.987585 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:42406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvCBXjF1vJNtV6CWrhpgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:51.011758 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvE_9ocpUE4ed4uDzV4gAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:57.485680 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:46032] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfvGQlT9VtDQc7bgUyRcAAAARQ"]
[Mon Mar 16 08:53:39.083579 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:50664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvQ3bQATo66fKoS7wzzAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:12.618297 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:50126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvZNSswJuvopo3lOhItgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:26.519434 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:59404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvco6lpbStxTqkSktV3QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:37.521662 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvfXjZBu2q05ozVU89VgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:55:21.215430 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:56968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvqXbQATo66fKoS7w0FAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:55:22.904156 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.228.16:34562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfvqglT9VtDQc7bgUyRzwAAAQw"]
[Mon Mar 16 08:56:07.139397 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:41386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv17ABkC4fWIHEf8HT3wAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:19.247613 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:57812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv4wlT9VtDQc7bgUySCgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:56:35.780278 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:35658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv846lpbStxTqkSktWvQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:38.555406 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv9glT9VtDQc7bgUySMwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:56:44.341549 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:58524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv_BXjF1vJNtV6CWrh8wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:45.680365 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:58530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv_bysWC90G-1nBrAuewAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:48.011050 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:58540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwALysWC90G-1nBrAugAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:02.461293 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:39370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwDo6lpbStxTqkSktWzwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:11.470289 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:44696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwF3jZBu2q05ozVU89tgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:57:50.083234 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:41454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwPrysWC90G-1nBrAuugAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:53.303245 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:53122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwQZqj1wV0Si-OkefRdAAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:55.682981 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:58102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwQ7ABkC4fWIHEf8HUAQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:57:57.520834 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.244.31:34292] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfwRbysWC90G-1nBrAuvQAAAY4"]
[Mon Mar 16 08:58:00.133027 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:58118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwSNSswJuvopo3lOhJEgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:04.949633 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:38724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwTAlT9VtDQc7bgUySmwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:07.911550 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:50666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwT9SswJuvopo3lOhJFAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:11.333148 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:38028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwUwlT9VtDQc7bgUySpwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:16.200869 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:57512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwWI6lpbStxTqkSktW7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:18.584100 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:57528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwWrABkC4fWIHEf8HUDQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:38.116082 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:50680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwbtSswJuvopo3lOhJNgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:42.746976 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:51550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwcglT9VtDQc7bgUySvAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:59:04.321149 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwiP9ocpUE4ed4uDzWWAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:59:27.838506 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:53320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwn46lpbStxTqkSktXOgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:00:23.806409 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.228.16:39478] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfw1wlT9VtDQc7bgUyS8QAAAQ0"]
[Mon Mar 16 09:00:27.858627 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:59402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw25qj1wV0Si-OkefSAwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:00:45.570738 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:37040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw7XjZBu2q05ozVU8-XAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:00:56.163080 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:42834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw-Jqj1wV0Si-OkefSGQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:02.641944 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:59874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw_nbQATo66fKoS7w0mwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:03.959664 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw__9ocpUE4ed4uDzWcQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:05.350745 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:58150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxAbABkC4fWIHEf8HUOwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:01:25.226045 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:42244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxFXjZBu2q05ozVU8-iQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:26.658340 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:50904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxFnjZBu2q05ozVU8-iwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:01:40.611751 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:50920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxJHjZBu2q05ozVU8-lwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:47.323921 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:52476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxK3jZBu2q05ozVU8-owAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:58.898256 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:53590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxNnbQATo66fKoS7w0wgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:02:57.545979 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:59156] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfxcdSswJuvopo3lOhJfwAAAIM"]
[Mon Mar 16 09:03:09.125009 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxfXbQATo66fKoS7w1HgAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:03:52.355766 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:60906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxqLABkC4fWIHEf8HUhQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:04:11.006405 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:39482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxu_9ocpUE4ed4uDzW1QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:04:57.819174 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:50118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfx6QlT9VtDQc7bgUyTkwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:05.667332 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:37094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfx8bysWC90G-1nBrAvNQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:24.946528 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:45388] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfyBI6lpbStxTqkSktYXwAAAkw"]
[Mon Mar 16 09:05:48.459476 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:59594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyHNSswJuvopo3lOhJ9gAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:50.879093 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:44584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyHnjZBu2q05ozVU8_HgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 09:06:00.919061 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:37110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyKHjZBu2q05ozVU8_OQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:06:06.190139 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:59980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyLnjZBu2q05ozVU8_SQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:06:13.882749 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:49282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyNXjZBu2q05ozVU8_WwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:06:15.226676 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:36874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyNxXjF1vJNtV6CWri0QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:06:22.259555 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:42254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyPo6lpbStxTqkSktYeQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:06:35.381404 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyS7ysWC90G-1nBrAvUgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:05.171203 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyadSswJuvopo3lOhKKAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:06.645387 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:51264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyaglT9VtDQc7bgUyTwAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:49.327363 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:42300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfylXjZBu2q05ozVU9AAwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:57.262760 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfynf9ocpUE4ed4uDzXNQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:57.614948 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.244.31:35720] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfyndSswJuvopo3lOhKNwAAAI4"]
[Mon Mar 16 09:08:15.503210 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:51266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyrwlT9VtDQc7bgUyUDgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:08:31.522788 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyvtSswJuvopo3lOhKTwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:08:36.183551 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:58208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyxAlT9VtDQc7bgUyUMQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:08:42.339450 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:58218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyynbQATo66fKoS7w2RAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:08:54.203412 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:47896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfy1njZBu2q05ozVU9ARQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:01.057920 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:42588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzVY6lpbStxTqkSktY5gAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:10.639361 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:41148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzXrysWC90G-1nBrAv_gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:34.079078 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:58686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzdrysWC90G-1nBrAwGwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:49.640301 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:58976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzhQlT9VtDQc7bgUyVeAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:54.887179 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:45396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzinbQATo66fKoS7w2gAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:55.711100 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:53750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzi5qj1wV0Si-OkefTFQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:03.541001 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:55442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzk9SswJuvopo3lOhKmQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:12:07.171204 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:40698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzlxXjF1vJNtV6CWrjqwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:37.159187 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:45410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfztbABkC4fWIHEf8HVcgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:39.180558 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:59284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfztxXjF1vJNtV6CWrj0AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:12:39.534930 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:45074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzt5qj1wV0Si-OkefTKAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:52.000728 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:58888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzwo6lpbStxTqkSktZHgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:58.659869 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:48636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfzyrABkC4fWIHEf8HVfgAAAFA"]
[Mon Mar 16 09:12:59.875344 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:52396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzyxXjF1vJNtV6CWrj2gAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:06.088043 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:49316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz0XjZBu2q05ozVU9AqgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:24.855582 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:36768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz5LABkC4fWIHEf8HVnwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:13:40.443973 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:33734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz9Jqj1wV0Si-OkefTUgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:45.982347 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:50356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz-RXjF1vJNtV6CWrj8wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:48.459210 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:50362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz_P9ocpUE4ed4uDzXtAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:13:58.643946 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:35396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0BglT9VtDQc7bgUyVvQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:20.206129 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:45850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0HHbQATo66fKoS7w25gAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:21.551466 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0HZqj1wV0Si-OkefTYwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:22.859267 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:49072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0Hpqj1wV0Si-OkefTZAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:27.330953 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:49078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0I7ysWC90G-1nBrAwawAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:31.430344 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:52700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0J_9ocpUE4ed4uDzX2QAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:32.737010 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:36454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0KJqj1wV0Si-OkefTagAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:39.731479 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:49088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0L3bQATo66fKoS7w29gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:52.975587 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:36460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0PLABkC4fWIHEf8HVxQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:15:08.515373 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:48636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0TI6lpbStxTqkSktZdQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:15:13.151266 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:43442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0Uf9ocpUE4ed4uDzX8wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:15:27.932568 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:43456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0X7ysWC90G-1nBrAwlQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:16:57.668054 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0uY6lpbStxTqkSktZ9wAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:04.483201 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:45022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wLysWC90G-1nBrAwqwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:05.187231 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wY6lpbStxTqkSktZ_gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:06.473702 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:44420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wpqj1wV0Si-OkefT_QAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:08.803531 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:44428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0xJqj1wV0Si-OkefUAwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:16.219915 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0zBXjF1vJNtV6CWrkOgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:17.503064 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:36554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0zZqj1wV0Si-OkefUEAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:19.769897 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:36562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0znjZBu2q05ozVU9BGAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:23.255021 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:42440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf00wlT9VtDQc7bgUyWEAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:39.216091 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:42456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf047ysWC90G-1nBrAwxQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:42.640840 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf05hXjF1vJNtV6CWrkQQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:43.930965 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:41164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf05xXjF1vJNtV6CWrkQgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:45.291093 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:41172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf06dSswJuvopo3lOhLdgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:48.715335 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:41180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf07AlT9VtDQc7bgUyWHAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:50.013181 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:41192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf07rABkC4fWIHEf8HWAwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:51.440793 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:56696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf073bQATo66fKoS7w3egAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:52.791037 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:56706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf08P9ocpUE4ed4uDzYHAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:54.131040 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:56714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf08rysWC90G-1nBrAwyAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:57.590543 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:56718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf09f9ocpUE4ed4uDzYIQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:58.906236 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:56726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf09o6lpbStxTqkSktaEQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:08.740667 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:60304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ABXjF1vJNtV6CWrkUwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:12.139722 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:60318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1BLABkC4fWIHEf8HWDAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:13.429423 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:40700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1BRXjF1vJNtV6CWrkVQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:15.607526 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:40712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1B_9ocpUE4ed4uDzYJgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:16.886770 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:40722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1CI6lpbStxTqkSktaGAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:18.675515 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:45034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1Cpqj1wV0Si-OkefUUAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:20.278010 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:40738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1DHjZBu2q05ozVU9BIgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:22.063412 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:60312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1DhXjF1vJNtV6CWrkWwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:29.367261 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:60324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1FXbQATo66fKoS7w3hwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:35.214881 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:60324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1G3bQATo66fKoS7w3jQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:51.895835 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:58932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1KhXjF1vJNtV6CWrkcwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:42.874556 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:58168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1XglT9VtDQc7bgUyWbQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:46.301943 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:57140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1YhXjF1vJNtV6CWrkfwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:56.772863 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:57142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1bI6lpbStxTqkSktaOAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:58.653982 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1bnbQATo66fKoS7w3qwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:08.384468 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1eP9ocpUE4ed4uDzYiwAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:09.739052 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:46996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ebysWC90G-1nBrAw6wAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:11.267648 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:38618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ewlT9VtDQc7bgUyWdQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:12.560779 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:38622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1fHbQATo66fKoS7w3rwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:14.743359 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:52724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1fv9ocpUE4ed4uDzYkQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:20:16.007020 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:38634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1gJqj1wV0Si-OkefUeQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:17.285925 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1gbysWC90G-1nBrAw7gAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:19.247159 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:33366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1g9SswJuvopo3lOhLxwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:20.878829 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:38658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hLABkC4fWIHEf8HWLwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:22.107024 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:58560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hrysWC90G-1nBrAw8QAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:23.390901 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:58566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hxXjF1vJNtV6CWrkjgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:24.749532 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:58572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1iBXjF1vJNtV6CWrkkQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:27.087413 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:58578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1i_9ocpUE4ed4uDzYlwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:28.394600 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:58584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jNSswJuvopo3lOhLzAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:29.180368 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.228.16:33038] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf1jQlT9VtDQc7bgUyWeQAAAQ4"]
[Mon Mar 16 09:20:29.706940 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:58586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jZqj1wV0Si-OkefUggAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:30.961497 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:48036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jpqj1wV0Si-OkefUgwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:32.231161 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:48044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kP9ocpUE4ed4uDzYmAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:34.158641 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:48048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kXbQATo66fKoS7w3tQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:35.477905 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:48062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kwlT9VtDQc7bgUyWfQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:36.755584 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:48064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1lP9ocpUE4ed4uDzYmQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:39.088604 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:48068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1l5qj1wV0Si-OkefUiAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:40.359388 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:56052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mP9ocpUE4ed4uDzYnAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:41.658126 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:56058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mXbQATo66fKoS7w3uAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:42.978848 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:56070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mnbQATo66fKoS7w3vQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:44.277988 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:56080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nHjZBu2q05ozVU9BjQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:45.573658 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:56094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nZqj1wV0Si-OkefUjQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:46.864260 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:56096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nhXjF1vJNtV6CWrklQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:48.167064 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:56112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1oI6lpbStxTqkSktaSQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:49.335117 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:56126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1obysWC90G-1nBrAw-gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:52.081311 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:41464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ohXjF1vJNtV6CWrkmQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:53.507595 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1pf9ocpUE4ed4uDzYogAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:55.890975 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:41480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1p7ysWC90G-1nBrAw_wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:05.482302 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:42872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1sbABkC4fWIHEf8HWWAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:08.644572 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:45238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1tBXjF1vJNtV6CWrknAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:21:20.846304 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:41486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1wP9ocpUE4ed4uDzYvAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:29.578941 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:45246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ydSswJuvopo3lOhMAgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:29.580180 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:44332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1yNSswJuvopo3lOhMAAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:30.913962 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:45412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1yglT9VtDQc7bgUyWiQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:32.205925 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:45428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1zAlT9VtDQc7bgUyWigAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:34.166952 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:37872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ztSswJuvopo3lOhMCAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:34.803169 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:45434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1zglT9VtDQc7bgUyWkgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:36.147272 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:45442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf10HjZBu2q05ozVU9BuAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:54.307946 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:45446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf14nbQATo66fKoS7w30wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:01.671340 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:33294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf16QlT9VtDQc7bgUyWmwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:08.922614 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:35984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf18Jqj1wV0Si-OkefUwgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:14.376141 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:40766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf19rysWC90G-1nBrAxEgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:15.940083 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:40768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf19wlT9VtDQc7bgUyWoQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:35.428580 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:40772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2CZqj1wV0Si-OkefU6gAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:37.805060 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:43078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2DQlT9VtDQc7bgUyWrQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:39.115043 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:43082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2DwlT9VtDQc7bgUyWsAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:50.134385 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:57678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2GnjZBu2q05ozVU9B1AAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:52.565645 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:44340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2HLABkC4fWIHEf8HWigAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:59.560293 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:44348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2IxXjF1vJNtV6CWrkuQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:02.011265 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:36110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2JnjZBu2q05ozVU9B3QAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:05.883996 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:56384] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf2KdSswJuvopo3lOhMHQAAAIU"]
[Mon Mar 16 09:23:18.592482 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:36116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2M7ABkC4fWIHEf8HWrQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:28.110384 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:33348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2QBXjF1vJNtV6CWrkzwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:32.628813 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:38962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2RBXjF1vJNtV6CWrk0gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:33.907275 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:45170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2RXbQATo66fKoS7w38AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:35.369157 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:45186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2R3bQATo66fKoS7w39QAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:37.920831 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:45200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2SRXjF1vJNtV6CWrk3QAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:42.969383 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:45212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2TtSswJuvopo3lOhMKwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:10.400337 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:57366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2anbQATo66fKoS7w4EwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:11.759056 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:32832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2axXjF1vJNtV6CWrk6AAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:42.105040 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:32834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2io6lpbStxTqkSkta_gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:59.136200 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:40236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2m7ABkC4fWIHEf8HW2AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:10.483757 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:40664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2prABkC4fWIHEf8HW4gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:19.935142 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:38822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2r5qj1wV0Si-OkefVTgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:30.757019 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:54450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2urABkC4fWIHEf8HW7wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:32.410520 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.228.16:52294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf2vP9ocpUE4ed4uDzY_wAAAg8"]
[Mon Mar 16 09:25:51.275153 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:39468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2z_9ocpUE4ed4uDzZIAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:58.831852 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:47886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf21rABkC4fWIHEf8HW-gAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:26:00.137582 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf22HjZBu2q05ozVU9CJwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:26:52.876806 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3DNSswJuvopo3lOhMiQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:26:54.197981 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:59922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Dv9ocpUE4ed4uDzZKgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:13.119247 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:59938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3IXbQATo66fKoS7w4eQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:14.400396 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:56574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Ipqj1wV0Si-OkefVfQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:15.675301 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3I7ysWC90G-1nBrAxfQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:16.982990 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:56604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3JI6lpbStxTqkSktbVQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:18.980632 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:56612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3JrysWC90G-1nBrAxfwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:22.444043 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3KrABkC4fWIHEf8HXDwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:26.191346 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:37388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3LglT9VtDQc7bgUyX2AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:27.500387 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:37390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3L3bQATo66fKoS7w4hwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:28.660973 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:37394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3MLABkC4fWIHEf8HXEQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:31.031530 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:37404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3MwlT9VtDQc7bgUyX2gAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:32.392555 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:45130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NNSswJuvopo3lOhMlQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:33.579027 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:45142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NbABkC4fWIHEf8HXEgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:34.912282 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:45158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NrABkC4fWIHEf8HXEwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:36.281019 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:45174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3OJqj1wV0Si-OkefVggAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:37.437048 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3OQlT9VtDQc7bgUyX3QAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:41.701658 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:45192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3PRXjF1vJNtV6CWrlJQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:49.515777 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:57332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3RbysWC90G-1nBrAxhgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:50.842874 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Ro6lpbStxTqkSktbdAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:07.682883 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.244.31:60468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf3V3jZBu2q05ozVU9CPgAAAU4"]
[Mon Mar 16 09:28:15.827327 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:43796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3X7ysWC90G-1nBrAxpgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:18.152803 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3YrABkC4fWIHEf8HXGwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:21.794954 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:45974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3ZXbQATo66fKoS7w4xAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:23.412020 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:58104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Z9SswJuvopo3lOhMmgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:29:08.573186 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:58120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3lLABkC4fWIHEf8HXSQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:29:20.705895 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:54696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3oP9ocpUE4ed4uDzZRgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:06.363683 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3zo6lpbStxTqkSktbwAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:09.779926 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:50514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf30Y6lpbStxTqkSktbwwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:11.091335 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:48480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf30wlT9VtDQc7bgUyX-gAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:12.412603 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:48490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf31NSswJuvopo3lOhMsQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:15.042827 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf313jZBu2q05ozVU9CVgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:25.219880 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:48498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf34Y6lpbStxTqkSktbzwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:40.059715 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.228.16:39626] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf38P9ocpUE4ed4uDzZVwAAAgg"]
[Mon Mar 16 09:30:43.669055 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:38564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf383jZBu2q05ozVU9CZwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:48.058987 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:59846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3-AlT9VtDQc7bgUyYEgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:50.507019 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:59852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3-pqj1wV0Si-OkefVvQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:31:07.042925 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:58358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4C9SswJuvopo3lOhMvwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:01.355746 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:43448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4QXbQATo66fKoS7w5ZQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:02.702523 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4QrysWC90G-1nBrAxsgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:05.055308 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:41152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4RdSswJuvopo3lOhMyQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:11.251215 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:41156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4SwlT9VtDQc7bgUyYaAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:37.540467 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:43860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ZdSswJuvopo3lOhM4AAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:40.074743 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:46108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4aP9ocpUE4ed4uDzZaQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:43.470950 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:53686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4axXjF1vJNtV6CWrlvgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:33:04.915155 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:53694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4gBXjF1vJNtV6CWrl0wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:33:13.383331 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.244.31:54500] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf4iZqj1wV0Si-OkefWKQAAAAA"]
[Mon Mar 16 09:33:14.104456 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:39982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4itSswJuvopo3lOhM7gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:15.411309 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:50994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4i3bQATo66fKoS7w5bQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:16.982308 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:50996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4jJqj1wV0Si-OkefWKgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:18.271498 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:51008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4jv9ocpUE4ed4uDzZbwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:19.423757 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:51010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4j3jZBu2q05ozVU9ChQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:20.711030 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:59932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4kBXjF1vJNtV6CWrl1gAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:21.991042 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:59946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4kXbQATo66fKoS7w5cAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:29.410214 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:59956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4mRXjF1vJNtV6CWrl3QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:30.695793 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4mnjZBu2q05ozVU9CiAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:31.867489 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:58922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4m3jZBu2q05ozVU9CiQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:33.185986 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:58934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ndSswJuvopo3lOhM8QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:39.931662 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:58948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4o3bQATo66fKoS7w5egAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:42.307063 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:39118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4pglT9VtDQc7bgUyYwQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:44.755571 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:39124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4qHbQATo66fKoS7w5fAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:46.046644 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:39140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4qhXjF1vJNtV6CWrl3wAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:48.444364 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:39150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4rI6lpbStxTqkSktb8AAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:49.737299 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:39164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4rbysWC90G-1nBrAxywAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:58.239218 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:48032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4tv9ocpUE4ed4uDzZhAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:00.563157 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:48042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4uLysWC90G-1nBrAx0gAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:01.847970 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:41662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ubABkC4fWIHEf8HXqAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:04.452338 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:41676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4vHjZBu2q05ozVU9CkAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:05.737201 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:41688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4vY6lpbStxTqkSktb9AAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:14.419082 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:41696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4xhXjF1vJNtV6CWrl7AAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:15.723504 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:47654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4x46lpbStxTqkSktb9QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:17.277933 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:47662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ybysWC90G-1nBrAx0wAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:19.612624 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:47674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ynbQATo66fKoS7w5fwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:36.305949 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:51944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf43LysWC90G-1nBrAx6AAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:37.565192 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:45290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf43dSswJuvopo3lOhNAQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:49.123301 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:45304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf46XjZBu2q05ozVU9CnwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:12.242242 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:48422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5AAlT9VtDQc7bgUyZOAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:14.639469 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:42474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5AhXjF1vJNtV6CWrl_AAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:32.416473 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:42488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5FNSswJuvopo3lOhNIAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:38.272358 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:48088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5GhXjF1vJNtV6CWrmCAAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:39.607046 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5G3jZBu2q05ozVU9CqgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:35:40.102249 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.228.16:40736] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf5HLABkC4fWIHEf8HX6wAAAFI"]
[Mon Mar 16 09:35:45.087497 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:44048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5IZqj1wV0Si-OkefWWwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:35:48.491766 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:44062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5JJqj1wV0Si-OkefWXgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:50.869582 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:44064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5JnjZBu2q05ozVU9CsgAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:58.135793 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:33532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5Lo6lpbStxTqkSktcFAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:59.400171 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:33542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5L9SswJuvopo3lOhNJgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:01.202841 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5MAlT9VtDQc7bgUyZSgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:03.659407 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:41754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5M9SswJuvopo3lOhNKgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:06.009535 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:41770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5NnbQATo66fKoS7w5zwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:23.308035 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:41772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5R5qj1wV0Si-OkefWbwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:25.900534 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:59468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5SdSswJuvopo3lOhNMQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:27.185989 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5S5qj1wV0Si-OkefWcAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:29.556414 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:59486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5TbABkC4fWIHEf8HX-wAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:24.467554 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:41498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5hLABkC4fWIHEf8HYPAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:37:25.746313 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:60984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5hf9ocpUE4ed4uDzaCAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:30.477937 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5iv9ocpUE4ed4uDzaDQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:46.000148 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:42904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5mdSswJuvopo3lOhNSQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:38:15.574080 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:55554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf5t7ABkC4fWIHEf8HYTAAAAEM"]
[Mon Mar 16 09:38:39.515527 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:49042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5z_9ocpUE4ed4uDzaRQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:38:41.930961 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:51928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf50Zqj1wV0Si-OkefWlgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:08.600871 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:51932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf57HbQATo66fKoS7w6MAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:35.901326 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:40422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6B3jZBu2q05ozVU9DXwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:42.731427 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:48180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6DnbQATo66fKoS7w6OwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:39:45.106351 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:44032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6EY6lpbStxTqkSktcQwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:39:48.471385 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:44034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6FNSswJuvopo3lOhNXAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:53.614421 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:44046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6GZqj1wV0Si-OkefWxAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:01.276374 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:38524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6IZqj1wV0Si-OkefW0wAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:04.589941 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:59698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6JP9ocpUE4ed4uDzaWAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:11.077264 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:59704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6K3jZBu2q05ozVU9DaQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:12.422372 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:58412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6LLABkC4fWIHEf8HYXgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:13.691411 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:58422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6LbysWC90G-1nBrAynQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:15.006594 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:58434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6L46lpbStxTqkSktcSgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:16.176323 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:58436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6MI6lpbStxTqkSktcSwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:17.506361 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:58452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6MY6lpbStxTqkSktcTQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:18.775540 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:58460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Mo6lpbStxTqkSktcTwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:19.926378 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:58474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6M46lpbStxTqkSktcUQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:21.192863 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:54058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Nf9ocpUE4ed4uDzaXQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:22.528765 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:54064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Npqj1wV0Si-OkefW5QAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:23.853921 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:54078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6N3jZBu2q05ozVU9DagAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:25.142781 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:54086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6OQlT9VtDQc7bgUyZogAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:26.277949 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:54092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Opqj1wV0Si-OkefW7QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:27.678988 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:54106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6O3bQATo66fKoS7w6SAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:29.029184 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:54108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6PY6lpbStxTqkSktcVQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:30.391539 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:53922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Po6lpbStxTqkSktcWgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:31.775058 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:53938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6P_9ocpUE4ed4uDzaXwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:33.120128 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:53942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6QZqj1wV0Si-OkefW9AAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:34.400858 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:53958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6QnbQATo66fKoS7w6TQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:35.833952 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:53966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Q5qj1wV0Si-OkefW-QAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:37.036787 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:53972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RY6lpbStxTqkSktcXQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:38.325610 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:53986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RrABkC4fWIHEf8HYZwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:39.679354 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:53994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RxXjF1vJNtV6CWrmTQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:41.920071 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6SQlT9VtDQc7bgUyZpwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:41.924013 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.228.16:44058] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf6Sf9ocpUE4ed4uDzaZAAAAgw"]
[Mon Mar 16 09:40:43.445998 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:38928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6S3bQATo66fKoS7w6UAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:44.819917 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:38934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TLysWC90G-1nBrAyugAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:45.935532 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:38948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TdSswJuvopo3lOhNZwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:47.258914 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:38960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TwlT9VtDQc7bgUyZqAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:48.559034 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:38974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6UI6lpbStxTqkSktcXgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:49.840030 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:38978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6URXjF1vJNtV6CWrmUwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:50.999138 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:51960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6UnbQATo66fKoS7w6UwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:53.408773 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6VLysWC90G-1nBrAywwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:54.683866 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:51972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Vpqj1wV0Si-OkefXCgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:56.009951 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:51976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6WBXjF1vJNtV6CWrmVgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:57.303048 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:51988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Wf9ocpUE4ed4uDzaaAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:59.095214 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:51994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6W7ysWC90G-1nBrAyywAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:00.477496 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:33494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6XHbQATo66fKoS7w6VQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:01.790230 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:33500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6XXbQATo66fKoS7w6VgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:03.131537 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:33504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6X9SswJuvopo3lOhNaAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:04.494184 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:33508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YAlT9VtDQc7bgUyZrgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:05.805593 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YXbQATo66fKoS7w6WwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:07.071546 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:33524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YwlT9VtDQc7bgUyZrwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:08.347929 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:33538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ZBXjF1vJNtV6CWrmWwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:09.694233 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:33550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ZXjZBu2q05ozVU9DcgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:11.014128 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:54410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Z_9ocpUE4ed4uDzabAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:12.172396 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6aNSswJuvopo3lOhNaQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:13.474765 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:54424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6aQlT9VtDQc7bgUyZsQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:14.803347 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:54440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ahXjF1vJNtV6CWrmXQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:15.991523 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:54444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6a3jZBu2q05ozVU9DcwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:17.242730 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:54456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6bQlT9VtDQc7bgUyZswAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:18.775825 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:54460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6bo6lpbStxTqkSktcYwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:20.086620 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:54474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cJqj1wV0Si-OkefXIwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:21.481583 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:37132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cY6lpbStxTqkSktcZAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:22.820047 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:37136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cnbQATo66fKoS7w6XwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:24.130746 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:37142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dNSswJuvopo3lOhNbgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:25.410501 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:37144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dbysWC90G-1nBrAy4wAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:26.667084 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:37150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dtSswJuvopo3lOhNbwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:27.823168 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6d9SswJuvopo3lOhNcAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:29.236062 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:37178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6eY6lpbStxTqkSktcbQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:30.581672 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:46800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6eo6lpbStxTqkSktcbwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:31.888918 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:46802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6e3bQATo66fKoS7w6YQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:33.179789 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:46810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6fdSswJuvopo3lOhNcQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:34.545236 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:46818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6frysWC90G-1nBrAy7QAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:35.872126 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:46828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6f7ABkC4fWIHEf8HYcwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:37.162774 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:46836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6gXjZBu2q05ozVU9DdwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:38.487083 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:46850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6gglT9VtDQc7bgUyZuQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:39.831797 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:46854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6g3bQATo66fKoS7w6YgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:41.147330 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:36294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hdSswJuvopo3lOhNcwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:42.506905 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:36296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hv9ocpUE4ed4uDzadAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:43.723748 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:36310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hxXjF1vJNtV6CWrmYQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:45.045458 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6idSswJuvopo3lOhNdAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:46.347051 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:36332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6injZBu2q05ozVU9DeQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:47.687123 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:36344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6i_9ocpUE4ed4uDzadwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:49.005370 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:36354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jf9ocpUE4ed4uDzaeAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:50.311443 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:55704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jtSswJuvopo3lOhNdgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:51.671065 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:55720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jxXjF1vJNtV6CWrmZAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:52.853499 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:55728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6kJqj1wV0Si-OkefXLAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:54.175387 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:55738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6knbQATo66fKoS7w6awAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:55.323066 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:55746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6k9SswJuvopo3lOhNeAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:57.027682 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:55762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6lJqj1wV0Si-OkefXLQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:58.418286 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:55770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ltSswJuvopo3lOhNfAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:00.680673 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:55782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6mHjZBu2q05ozVU9DhQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:02.024126 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:56746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6mglT9VtDQc7bgUyZwAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:03.393015 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:56752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6m3jZBu2q05ozVU9DiAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:04.755150 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:56766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6nBXjF1vJNtV6CWrmZQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:06.103472 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:56772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ntSswJuvopo3lOhNfQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:07.437517 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:56778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6n7ysWC90G-1nBrAy_wAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:08.581679 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:56794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6oBXjF1vJNtV6CWrmZwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:11.186317 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:56804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6o3bQATo66fKoS7w6cwAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:12.494363 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6pP9ocpUE4ed4uDzakQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:13.801554 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:60066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6pZqj1wV0Si-OkefXNgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:15.078542 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:60078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6p7ABkC4fWIHEf8HYfAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:16.263555 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:60088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qP9ocpUE4ed4uDzalQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:17.539747 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:60104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qXjZBu2q05ozVU9DjAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:18.858927 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qhXjF1vJNtV6CWrmaQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:20.035450 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:60124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6rAlT9VtDQc7bgUyZyQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:21.296665 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:50384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6rY6lpbStxTqkSktcoQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:22.582871 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:50386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ro6lpbStxTqkSktcowAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:23.887351 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:50402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6r7ABkC4fWIHEf8HYfwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:25.067759 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:50410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6sY6lpbStxTqkSktcqAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:26.366687 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:50416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6stSswJuvopo3lOhNhgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:27.935217 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:50430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6s9SswJuvopo3lOhNhwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:29.295082 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:50438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6tQlT9VtDQc7bgUyZywAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:30.676888 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:52818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6trysWC90G-1nBrAzBAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:31.988529 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:52830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6t_9ocpUE4ed4uDzapAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:41.705209 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:52834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6wQlT9VtDQc7bgUyZ2QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:47.335355 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:38022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6xwlT9VtDQc7bgUyZ4gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:58.896384 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:39232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf60o6lpbStxTqkSktcxwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:43:12.127787 2026] [:error] [pid 21533:tid 140411582465792] [client 87.121.84.97:53430] [client 87.121.84.97] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/server/php/index.php"] [unique_id "abf633jZBu2q05ozVU9DoAAAAVM"]
[Mon Mar 16 09:43:29.314959 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:38032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf68HbQATo66fKoS7w6qgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:43:30.655269 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:55584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf68hXjF1vJNtV6CWrmeAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:43:37.278196 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:55592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6-QlT9VtDQc7bgUyZ_QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:43:38.491753 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:55608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6-v9ocpUE4ed4uDza6wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:44:41.322558 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:45096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7ObysWC90G-1nBrAziQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:44:44.811439 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:46716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7PP9ocpUE4ed4uDzbEwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:44:48.246220 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:46720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7QHjZBu2q05ozVU9DxgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:45:03.758275 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:54644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7T5qj1wV0Si-OkefXogAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:45:07.418921 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:55878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7U5qj1wV0Si-OkefXpwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:08.755416 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:53926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7VAlT9VtDQc7bgUyaHgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:19.873550 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:53936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7X46lpbStxTqkSktc-gAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:50.030806 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:54792] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf7fnjZBu2q05ozVU9D7wAAAUU"]
[Mon Mar 16 09:46:26.553793 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:36994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7onjZBu2q05ozVU9EEwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:27.882456 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:42356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7o7ysWC90G-1nBrAzqAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:30.239396 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:42366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7po6lpbStxTqkSktdGAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:31.722040 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.241.46:57258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7pxXjF1vJNtV6CWrnLwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:38.471030 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:42338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7rv9ocpUE4ed4uDzbTAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:47:23.510597 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:49892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf72_9ocpUE4ed4uDzbpAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:16.835014 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:48634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf8EHbQATo66fKoS7w7DAAAAMQ"]
[Mon Mar 16 09:48:26.168179 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:56032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8Gv9ocpUE4ed4uDzb4wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:27.478706 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:49218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8G46lpbStxTqkSktdPQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:48:39.378929 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8J7ysWC90G-1nBrAz0QAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:44.452251 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8LHjZBu2q05ozVU9EeQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:45.532351 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:34646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8LXbQATo66fKoS7w7GQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:48:49.619537 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:34660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8MAlT9VtDQc7bgUyaYAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:49:20.506224 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:39596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8UP9ocpUE4ed4uDzcCQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:44.133947 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:57882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8pNSswJuvopo3lOhOaAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:50:46.682994 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:47374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8pnbQATo66fKoS7w7mwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:47.706481 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:51898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8p5qj1wV0Si-OkefYGgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:50:50.123062 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8qnjZBu2q05ozVU9EnAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:51.789049 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.228.16:53684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf8qpqj1wV0Si-OkefYHQAAABI"]
[Mon Mar 16 09:50:54.975139 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:50026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8rnjZBu2q05ozVU9EogAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:51:24.195625 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:50042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8zAlT9VtDQc7bgUyaswAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:51:57.628661 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:57850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf87XbQATo66fKoS7w71wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:52:03.283301 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:60936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf88wlT9VtDQc7bgUyaygAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:20.905973 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:35266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9A7ysWC90G-1nBrA0hgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:23.464565 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:34480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9BwlT9VtDQc7bgUyazgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:28.203100 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:34488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9DLABkC4fWIHEf8HZ-gAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:32.867771 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:34498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9ENSswJuvopo3lOhOiQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:36.408717 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:38882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9FBXjF1vJNtV6CWrnnAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:38.791068 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:38896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9FnjZBu2q05ozVU9ExQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:39.351677 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9F_9ocpUE4ed4uDzcUgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:52:42.303796 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:36326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9GrABkC4fWIHEf8HaAAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:43.643146 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:36330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9G3bQATo66fKoS7w74wAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:48.362868 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:36336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9IAlT9VtDQc7bgUya3gAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:50.764494 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:36342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9ItSswJuvopo3lOhOmQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:53:11.583692 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:40246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9N9SswJuvopo3lOhOqwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:53:14.931003 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:57620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9OglT9VtDQc7bgUya6gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:53:17.655069 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.244.31:48278] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf9PRXjF1vJNtV6CWrnqAAAAco"]
[Mon Mar 16 09:53:17.657256 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:57626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9PBXjF1vJNtV6CWrnpgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:55:51.263382 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:39140] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf917ABkC4fWIHEf8HajAAAAFg"]
[Mon Mar 16 09:56:17.287753 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf98Y6lpbStxTqkSktebAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:58:18.347857 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.244.31:49626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf-aglT9VtDQc7bgUybYAAAAQw"]
[Mon Mar 16 09:59:55.941389 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:36302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf-ywlT9VtDQc7bgUyb7gAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:59:57.387329 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:60950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf-zbysWC90G-1nBrA1LwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:00:52.353315 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.228.16:47912] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf_BBXjF1vJNtV6CWrpEAAAAcg"]
[Mon Mar 16 10:01:01.878555 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.241.46:38928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_DXbQATo66fKoS7w9EQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:03.279776 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:38142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_D3jZBu2q05ozVU9GIQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:07.671491 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:38144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_EwlT9VtDQc7bgUycIQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:10.059531 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:50846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Fv9ocpUE4ed4uDzc8QAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:13.618282 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:50858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_GY6lpbStxTqkSkte0QAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:16.464687 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:50872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_G3bQATo66fKoS7w9FgAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:17.755097 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_HdSswJuvopo3lOhQPwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:18.938398 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:51116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Hv9ocpUE4ed4uDzc8gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:21.266251 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:51128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_IZqj1wV0Si-OkefZrQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:23.563179 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:51130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_I5qj1wV0Si-OkefZsQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:28.091249 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:51146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_KBXjF1vJNtV6CWrpNQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:29.382970 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Kf9ocpUE4ed4uDzc_QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:31.756872 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:45958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_K5qj1wV0Si-OkefZtQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:34.079977 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:45974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_LglT9VtDQc7bgUycMAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:36.427238 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:45990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_MHjZBu2q05ozVU9GNAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:38.785461 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:45998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_MrABkC4fWIHEf8Ha-wAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:40.230696 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:53112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NJqj1wV0Si-OkefZuwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:41.430663 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:53124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NbysWC90G-1nBrA1SwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:43.707514 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:53136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NrysWC90G-1nBrA1TgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:46.037950 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:53148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_OnjZBu2q05ozVU9GPgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:49.905261 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:53160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_PI6lpbStxTqkSkte4AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:53.570298 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:35296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_QXbQATo66fKoS7w9JQAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:59.063739 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:35312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_R7ABkC4fWIHEf8HbCAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:00.340209 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:49444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_SI6lpbStxTqkSkte5AAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:04.836832 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.241.46:49458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_THbQATo66fKoS7w9LgAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:06.130453 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:49460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Tpqj1wV0Si-OkefZxwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:08.282463 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:49462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_UHjZBu2q05ozVU9GRQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:10.683069 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:44428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_UnbQATo66fKoS7w9NAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:12.963350 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:44434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_VLABkC4fWIHEf8HbEAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:17.472901 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:44440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_WHjZBu2q05ozVU9GSwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:24.227011 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:39456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_YJqj1wV0Si-OkefZ0QAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:27.715898 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:39458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Y5qj1wV0Si-OkefZ2QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:47.184536 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:36848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_d3jZBu2q05ozVU9GYAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:49.576283 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:41462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ebysWC90G-1nBrA1bAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:53.134059 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:41476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ff9ocpUE4ed4uDzdHgAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:13.275062 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:41478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_kbysWC90G-1nBrA1gAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:15.577420 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:39358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ktSswJuvopo3lOhQ0wAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:18.348530 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf_ltSswJuvopo3lOhQ1gAAAIs"]
[Mon Mar 16 10:03:19.211089 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:39360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_l7ABkC4fWIHEf8HbOAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:53.837699 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:52736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_uXbQATo66fKoS7w9_AAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:57.254981 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_vZqj1wV0Si-OkefaBwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:05:50.369209 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:54834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgALv9ocpUE4ed4uDzeEQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:05:53.509198 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:60210] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgAMXjZBu2q05ozVU9GnQAAAVM"]
[Mon Mar 16 10:05:54.946692 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:44602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAMhXjF1vJNtV6CWrqFwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:03.030373 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:44188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAO5qj1wV0Si-OkefaHAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:03.518690 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:58588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAO3bQATo66fKoS7w-XgAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:11.950036 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:56372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAQ7ysWC90G-1nBrA1qAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:15.350116 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:49976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAR3bQATo66fKoS7w-YwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:23.584925 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:49978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgATxXjF1vJNtV6CWrqIAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:28.924667 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:46714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAVLysWC90G-1nBrA1rgAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:30.079530 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:60806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAVglT9VtDQc7bgUycqAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:31.340411 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:57626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAV7ysWC90G-1nBrA1sgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:32.768103 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:57640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWBXjF1vJNtV6CWrqIgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:34.015313 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:57648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWpqj1wV0Si-OkefaHwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:35.199102 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.241.46:57656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWwlT9VtDQc7bgUycqQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:55.614115 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:57662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAb7ysWC90G-1nBrA10gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:56.723137 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:38704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAcLysWC90G-1nBrA10wAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:56.914964 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:40454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAcP9ocpUE4ed4uDzeTAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:59.172273 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:35416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAc3bQATo66fKoS7w-agAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:02.280221 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:50476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAdglT9VtDQc7bgUyctQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:07:03.561634 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:48548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAd7ABkC4fWIHEf8HbYwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:05.999699 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:35418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAebysWC90G-1nBrA11AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:07.165778 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAe9SswJuvopo3lOhRBgAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:10.192394 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:59900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAftSswJuvopo3lOhRCAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:11.471581 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:59912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAfxXjF1vJNtV6CWrqJwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:12.828081 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:59920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAgJqj1wV0Si-OkefaJQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:15.951699 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:48560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAg3bQATo66fKoS7w-dAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:20.455474 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:59926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAiLysWC90G-1nBrA12wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:25.931354 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:56020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAjdSswJuvopo3lOhRDwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:28.033506 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:56026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAjwlT9VtDQc7bgUycvQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:29.490973 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:41904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAkZqj1wV0Si-OkefaJwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:30.637214 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:41918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAkv9ocpUE4ed4uDzeYQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:31.926900 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:41924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAk7ysWC90G-1nBrA13AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:33.220278 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:41934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlZqj1wV0Si-OkefaKAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:34.554890 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:41946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlrABkC4fWIHEf8HbdQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:35.725528 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:41952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlwlT9VtDQc7bgUycxAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:37.040836 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:41964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAmRXjF1vJNtV6CWrqLAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:38.206426 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:41596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAmhXjF1vJNtV6CWrqLgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:42.901504 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAnv9ocpUE4ed4uDzeaAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:44.203077 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:41610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAoJqj1wV0Si-OkefaKwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:45.383297 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:41622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAobysWC90G-1nBrA13wAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:46.645481 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:41626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAoglT9VtDQc7bgUyczgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:47.884641 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:41628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAo5qj1wV0Si-OkefaLgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:49.193977 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:40552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgApdSswJuvopo3lOhRGAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:50.507316 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:40558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAprysWC90G-1nBrA14AAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:52.181573 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:40570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAp3jZBu2q05ozVU9GygAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:53.877365 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:40578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAqf9ocpUE4ed4uDzeaQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:55.191852 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:40582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAq9SswJuvopo3lOhRGQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:56.511820 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:40598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgArJqj1wV0Si-OkefaMAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:58.695156 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:40608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgArpqj1wV0Si-OkefaMgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:59.669164 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:56964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAr3jZBu2q05ozVU9G0gAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:00.114723 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:38782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAsHjZBu2q05ozVU9G0wAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:03.626562 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.241.46:38784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAs5qj1wV0Si-OkefaNgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:12.279765 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAvI6lpbStxTqkSktfsgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:14.568098 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:38788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAvpqj1wV0Si-OkefaQgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:18.315813 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.244.31:57950] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgAwpqj1wV0Si-OkefaSQAAAAk"]
[Mon Mar 16 10:08:21.055472 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAxZqj1wV0Si-OkefaTAAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:23.384434 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:51426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAx7ABkC4fWIHEf8HbpQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:25.687331 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:51434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAyQlT9VtDQc7bgUydBAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:09:23.198897 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:51438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBAxXjF1vJNtV6CWrqYwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:24.483041 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:51694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBBLABkC4fWIHEf8Hb0wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:31.131225 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:51710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBC5qj1wV0Si-OkefaXwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:36.068021 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBEP9ocpUE4ed4uDzedAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:42.817353 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:40174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBFrysWC90G-1nBrA16QAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:09:46.468220 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBGnbQATo66fKoS7w-hQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:47.817621 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:39776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBG_9ocpUE4ed4uDzedwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:49.110990 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:39784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBHY6lpbStxTqkSktfvwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:50.453034 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:42972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBHv9ocpUE4ed4uDzeeAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:51.749460 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:42978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBH3bQATo66fKoS7w-iAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:53.039530 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:42986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBIf9ocpUE4ed4uDzeegAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:54.345948 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBIrABkC4fWIHEf8Hb7QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:56.860082 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:43008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBJLysWC90G-1nBrA17QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:58.135912 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:43018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBJhXjF1vJNtV6CWrqZwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:02.278379 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:43026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBKglT9VtDQc7bgUydnQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:03.609859 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:34712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBK7ysWC90G-1nBrA17gAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:06.031217 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:34718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBLpqj1wV0Si-OkefaZwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:07.387149 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:34726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBL3jZBu2q05ozVU9G6gAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:08.660054 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBMI6lpbStxTqkSktfwQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:10.790871 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBMrysWC90G-1nBrA17wAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:12.070971 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:40392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBNP9ocpUE4ed4uDzefQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:13.347318 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:40404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBNbysWC90G-1nBrA18QAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:15.526966 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:40408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBN3jZBu2q05ozVU9G7QAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:16.856069 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:40412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBOLysWC90G-1nBrA18gAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:19.553902 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:40424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBOpqj1wV0Si-OkefaaAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:20.897689 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:44588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBPBXjF1vJNtV6CWrqawAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:22.341630 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBPhXjF1vJNtV6CWrqbQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:24.629989 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQP9ocpUE4ed4uDzegwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:25.950927 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:44630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQZqj1wV0Si-OkefaaQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:27.417834 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:44646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQ_9ocpUE4ed4uDzehAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:28.720625 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:44676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBRI6lpbStxTqkSktfxAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:29.985692 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:44684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBRdSswJuvopo3lOhRVgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:32.579856 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:50212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBSNSswJuvopo3lOhRXQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:34.063818 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:50222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBStSswJuvopo3lOhRXwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:35.377183 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:50228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBS3jZBu2q05ozVU9G7gAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:36.675085 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:50238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBTI6lpbStxTqkSktfyAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:43.179800 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:40480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBUv9ocpUE4ed4uDzelwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:44.603726 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:40494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBVLABkC4fWIHEf8HcJAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:45.769149 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:40500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBVbABkC4fWIHEf8HcJgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:47.041029 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:40508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBV_9ocpUE4ed4uDzemgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:49.303661 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:40518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBWZqj1wV0Si-OkefabQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:50.570982 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:44092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBWv9ocpUE4ed4uDzemwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:51.873530 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:44094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBW3jZBu2q05ozVU9G8gAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:53.158980 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:44110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBXXjZBu2q05ozVU9G8wAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:55.578289 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:44114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBX5qj1wV0Si-OkefabwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:01.877369 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:55458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBZZqj1wV0Si-OkefacAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:03.008275 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBZ5qj1wV0Si-OkefacQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:04.276975 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBaP9ocpUE4ed4uDzenAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:06.623328 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBapqj1wV0Si-OkefadAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:07.907093 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:55492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBaxXjF1vJNtV6CWrqdAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:12.347850 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:55502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBcHjZBu2q05ozVU9G-gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:14.641402 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:36754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBcpqj1wV0Si-OkefaewAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:15.911504 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:36766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBc46lpbStxTqkSktfzQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:18.321086 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:36772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBdo6lpbStxTqkSktfzwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:19.612292 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:36774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBd7ysWC90G-1nBrA2AwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:23.012819 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:54404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBe5qj1wV0Si-OkefafgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:25.303151 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:54420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBfRXjF1vJNtV6CWrqdwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:26.617468 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBftSswJuvopo3lOhRiwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:27.916466 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:54426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBf_9ocpUE4ed4uDzeoAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:29.078301 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:54430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgf9ocpUE4ed4uDzeoQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:30.445345 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:39600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgo6lpbStxTqkSktf0QAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:31.739067 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgwlT9VtDQc7bgUydrwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:33.045474 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:39620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBhXjZBu2q05ozVU9G_gAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:34.314211 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:39636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBhpqj1wV0Si-OkefagQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:36.641483 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:39646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBiJqj1wV0Si-OkefagwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:37.898515 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:39650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBiXbQATo66fKoS7w-3gAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:39.291401 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:39658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBi7ysWC90G-1nBrA2CwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:40.573764 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.243.203:40376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBjBXjF1vJNtV6CWrqewAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:44.110163 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:40382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBkAlT9VtDQc7bgUydswAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:57.209904 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:40390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBnf9ocpUE4ed4uDzetwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:12:21.860789 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:55238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBtbABkC4fWIHEf8HcaQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:12:39.181563 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBx46lpbStxTqkSktf7gAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:12:47.883905 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:36980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBz46lpbStxTqkSktf9gAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:12:53.715092 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:36996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB1f9ocpUE4ed4uDze6AAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:05.345870 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:58586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB4dSswJuvopo3lOhRrwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:08.399063 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:50270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5NSswJuvopo3lOhRsgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:09.403093 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:45646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5bysWC90G-1nBrA2ngAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:09.698925 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:50286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5f9ocpUE4ed4uDze-AAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:21.789978 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.244.31:41134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgB8QlT9VtDQc7bgUydxwAAARg"]
[Mon Mar 16 10:13:25.084119 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:35788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB9dSswJuvopo3lOhRxAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:36.387192 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:43702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCAAlT9VtDQc7bgUyd3QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:41.704535 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:48120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCBXbQATo66fKoS7w-_wAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:48.342128 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:39110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCDI6lpbStxTqkSktgAAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:14:38.769979 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:57286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCPQlT9VtDQc7bgUyd_QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:14:45.412653 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:43242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCRf9ocpUE4ed4uDzfNQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:03.585194 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:57074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCV7ABkC4fWIHEf8HcvAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:14.681872 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:33902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCYhXjF1vJNtV6CWrq7wAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:16.475434 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:53350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZI6lpbStxTqkSktgDQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:17.643480 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:53354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZbABkC4fWIHEf8HcxwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:18.955838 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:45746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZv9ocpUE4ed4uDzfPgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:19.034164 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:39978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZwlT9VtDQc7bgUyeDwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:20.167417 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:45760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCaHjZBu2q05ozVU9HcgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:21.465350 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:45774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCaY6lpbStxTqkSktgDgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:23.669543 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCa7ysWC90G-1nBrA2zAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:25.173044 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:45788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCbRXjF1vJNtV6CWrq8QAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:26.372316 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:45800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCbrABkC4fWIHEf8Hc0QAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:27.578521 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCb5qj1wV0Si-OkefavAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:28.863625 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:53150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCcHbQATo66fKoS7w_JgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:29.159807 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCcXjZBu2q05ozVU9HdgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:30.121810 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:53166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCctSswJuvopo3lOhR3QAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:31.350018 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.241.46:53172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCc3bQATo66fKoS7w_KgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:32.532745 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:53184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdHjZBu2q05ozVU9HeQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:33.899827 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:53190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdY6lpbStxTqkSktgEQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:34.091594 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:48308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdglT9VtDQc7bgUyeFAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:35.091143 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:53198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCd7ysWC90G-1nBrA2zwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:36.538162 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:48322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeBXjF1vJNtV6CWrq-QAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:36.551043 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeLysWC90G-1nBrA22gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:37.899170 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:53212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeZqj1wV0Si-OkefayAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:37.926156 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:48326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCebABkC4fWIHEf8Hc6AAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:39.067280 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:50534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCexXjF1vJNtV6CWrq_AAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:40.470855 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:50540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfJqj1wV0Si-OkefazAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:41.971156 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:50552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfXbQATo66fKoS7w_NwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:43.149279 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:50554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCf3jZBu2q05ozVU9HigAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:43.899119 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:48334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfxXjF1vJNtV6CWrrAQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:44.355457 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:50566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgAlT9VtDQc7bgUyeGAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:45.179377 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:38890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgZqj1wV0Si-Okefa1AAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:45.918581 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:50582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgRXjF1vJNtV6CWrrAgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:46.528468 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:38894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgnbQATo66fKoS7w_OwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:47.091696 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCg3bQATo66fKoS7w_PAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:47.729438 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:38908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCg7ysWC90G-1nBrA23AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:48.399388 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:52106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChHjZBu2q05ozVU9HiwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:49.091298 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChdSswJuvopo3lOhR6wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:49.727323 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:52108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChZqj1wV0Si-Okefa3AAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:50.419541 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:33558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChrysWC90G-1nBrA23wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:50.885157 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:52110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCho6lpbStxTqkSktgIgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:51.759057 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:33566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChwlT9VtDQc7bgUyeHQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:52.323855 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:52116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCiLABkC4fWIHEf8Hc9gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:53.167370 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:33574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCibABkC4fWIHEf8Hc-QAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:53.779417 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:52124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCibABkC4fWIHEf8Hc-wAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:55.471577 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:52126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCi9SswJuvopo3lOhR7wAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:56.815025 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:52140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCjI6lpbStxTqkSktgJgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:58.335570 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:44096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCjv9ocpUE4ed4uDzfUwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:00.604961 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:44100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCkAlT9VtDQc7bgUyeIgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:01.997118 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:44112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCkXjZBu2q05ozVU9HkQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:02.551485 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:33578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCko6lpbStxTqkSktgLQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:04.259337 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:44118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgClP9ocpUE4ed4uDzfVQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:10.070363 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:59710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCmnbQATo66fKoS7w_UwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:13.820113 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:37194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCnbABkC4fWIHEf8HdDAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:15.155018 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:37208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCn46lpbStxTqkSktgLgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:19.591068 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:37218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCowlT9VtDQc7bgUyeKgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:21.471910 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:44132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCpXbQATo66fKoS7w_ZgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:24.775930 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:47504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCqLysWC90G-1nBrA25QAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:26.063349 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:47526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCqpqj1wV0Si-OkefbAAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:27.228696 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCq5qj1wV0Si-OkefbBAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:27.447349 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:47538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCq3jZBu2q05ozVU9HlAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:28.719116 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:42208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCrBXjF1vJNtV6CWrrCQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:29.580674 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:53362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCrQlT9VtDQc7bgUyeLAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:32.036266 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:41742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCsHbQATo66fKoS7w_bAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:36.756645 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:41748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCtHjZBu2q05ozVU9HmAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:39.126478 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:41764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCtxXjF1vJNtV6CWrrEgAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:45.156098 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCvXbQATo66fKoS7w_eAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:45.780149 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:44432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCvXjZBu2q05ozVU9HnwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:49.207471 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:44440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCwbABkC4fWIHEf8HdIAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:51.843592 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCw46lpbStxTqkSktgNAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:53.169982 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:53618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCxRXjF1vJNtV6CWrrHwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:53.187064 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:39000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCxXjZBu2q05ozVU9HpgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:55.604008 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:53628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCx9SswJuvopo3lOhR-gAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:56.946039 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:53644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCyHjZBu2q05ozVU9HqAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:59.274368 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:53660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCy7ABkC4fWIHEf8HdJAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:01.671408 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:40880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCzXbQATo66fKoS7w_ewAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:02.971565 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:40886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCzrABkC4fWIHEf8HdJgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:32.818508 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:40898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC7BXjF1vJNtV6CWrrWQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:34.122573 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:32774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC7njZBu2q05ozVU9HrAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:35.514122 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:32788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC73bQATo66fKoS7w_gQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:47.418940 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:32800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC-7ysWC90G-1nBrA3IwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:48.503294 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:51404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC_LysWC90G-1nBrA3JQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:17:56.230126 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:50990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBP9ocpUE4ed4uDzfeQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:57.550274 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:36874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBf9ocpUE4ed4uDzfewAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:57.750455 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:50176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBf9ocpUE4ed4uDzffAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:58.882266 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:36878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBv9ocpUE4ed4uDzffQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:03.360732 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:49994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDC3jZBu2q05ozVU9HswAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:03.610103 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:38034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDC_9ocpUE4ed4uDzfgwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:06.991089 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:38042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDDpqj1wV0Si-OkefbRAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:23.183116 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDH7ABkC4fWIHEf8HdTgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:24.590159 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:50822] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDIAlT9VtDQc7bgUyeRgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:26.851372 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:50830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDIpqj1wV0Si-OkefbTgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:30.610969 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:50004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDJrABkC4fWIHEf8HdVgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:32.817187 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:42278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDKP9ocpUE4ed4uDzfiQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:34.100285 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:42282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDKrABkC4fWIHEf8HdVwAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:35.325321 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:42296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDK7ABkC4fWIHEf8HdWAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:39.749127 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDL5qj1wV0Si-OkefbVQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:42.107775 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:52692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDMpqj1wV0Si-OkefbVwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:18:47.892714 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:56120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDN9SswJuvopo3lOhSSQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:50.712495 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:52704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDOv9ocpUE4ed4uDzfkQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:55.343186 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:35646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDPwlT9VtDQc7bgUyeUAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:19:43.428693 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:59686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDb7ABkC4fWIHEf8HdjQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:19:44.699662 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:48222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDcHbQATo66fKoS7w_jgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:20:15.526945 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:35648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDjwlT9VtDQc7bgUyelgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:16.840388 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.241.46:48456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDkHbQATo66fKoS7w_mgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:18.009963 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:44330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDkpqj1wV0Si-OkefbaAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:21.487990 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDlf9ocpUE4ed4uDzfoQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:22.777894 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:44350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDlpqj1wV0Si-OkefbaQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:24.061284 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:44354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmAlT9VtDQc7bgUyemAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:25.216351 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:44366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmdSswJuvopo3lOhScAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:26.571158 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:44382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmglT9VtDQc7bgUyemQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:27.764275 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:44384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDm7ABkC4fWIHEf8HdkQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:28.884767 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:56938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDnJqj1wV0Si-OkefbagAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:30.152168 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:56946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDnv9ocpUE4ed4uDzfogAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:32.375407 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:56958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDoBXjF1vJNtV6CWrrnQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:33.680934 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:56972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDoRXjF1vJNtV6CWrrngAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:34.878722 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:56988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDopqj1wV0Si-OkefbawAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:36.065359 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:56998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDpHjZBu2q05ozVU9HyQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:37.416027 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:57000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDpY6lpbStxTqkSktgTgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:38.722892 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:41356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDptSswJuvopo3lOhSfgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:39.880921 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:41360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDp5qj1wV0Si-OkefbbAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:41.181931 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:41376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDqRXjF1vJNtV6CWrrnwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:43.491486 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:41386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDqhXjF1vJNtV6CWrroQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:46.149906 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:41390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDrrABkC4fWIHEf8HdlQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:49.974947 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:35742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDsf9ocpUE4ed4uDzfqAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:51.100018 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:35752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDs_9ocpUE4ed4uDzfqQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:52.415836 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtLABkC4fWIHEf8HdmAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:53.615268 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:35768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtbysWC90G-1nBrA3lAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:54.892518 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:35074] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgDtpqj1wV0Si-OkefbbQAAABg"]
[Mon Mar 16 10:20:54.976333 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:35770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtrABkC4fWIHEf8HdmQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:56.162247 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:35780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDuHjZBu2q05ozVU9HzAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:57.446744 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:35796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDubABkC4fWIHEf8HdmwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:58.629765 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:35920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDurABkC4fWIHEf8HdnQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:59.918543 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:35924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDu7ABkC4fWIHEf8HdngAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:01.006332 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:48226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDvdSswJuvopo3lOhSkQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:01.061708 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:35938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDvQlT9VtDQc7bgUyeoQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:03.542988 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:35946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDv3bQATo66fKoS7w_ogAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:06.323452 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:35960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDwNSswJuvopo3lOhSkgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:07.678248 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:35972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDw46lpbStxTqkSktgUAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:08.852605 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:51314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDxNSswJuvopo3lOhSlAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:11.419257 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:51326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDx3bQATo66fKoS7w_pAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:17.936811 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:51334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDzbysWC90G-1nBrA3ngAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:19.197661 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:57360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDzwlT9VtDQc7bgUyevwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:21.816080 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:34536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD0QlT9VtDQc7bgUyexQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:24.139533 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1I6lpbStxTqkSktgVQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:25.454205 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:36114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1Y6lpbStxTqkSktgVwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:27.894838 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:36124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1rysWC90G-1nBrA3oAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:29.226635 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:36136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD2QlT9VtDQc7bgUyezAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:30.555017 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD2njZBu2q05ozVU9H0QAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:31.862794 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:49894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD27ysWC90G-1nBrA3oQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:33.147082 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD3f9ocpUE4ed4uDzfrwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:35.532132 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD3_9ocpUE4ed4uDzfswAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:36.822042 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD4HjZBu2q05ozVU9H0wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:38.021109 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:49946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD4tSswJuvopo3lOhSlQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:39.326574 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD45qj1wV0Si-OkefbcwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:40.669667 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:57592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5HjZBu2q05ozVU9H1gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:41.851817 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:57598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5QlT9VtDQc7bgUye2QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:42.845399 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:57368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5glT9VtDQc7bgUye2gAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:43.250599 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:57604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD53jZBu2q05ozVU9H1wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:44.421776 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:57614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6LysWC90G-1nBrA3ogAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:45.913818 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:57616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6XbQATo66fKoS7w_pwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:46.155014 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:60912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6pqj1wV0Si-OkefbdwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:47.262843 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:57630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD67ABkC4fWIHEf8HdpwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:48.478364 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:57632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7LABkC4fWIHEf8HdqAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:49.650993 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:57644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7bysWC90G-1nBrA3owAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:50.976802 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:35884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7v9ocpUE4ed4uDzfuQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:52.184147 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:35898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8I6lpbStxTqkSktgWQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:53.483263 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8bABkC4fWIHEf8HdqQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:53.911484 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:60926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8f9ocpUE4ed4uDzfvQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:54.867270 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:35918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8njZBu2q05ozVU9H2AAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:57.652406 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:35016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD9RXjF1vJNtV6CWrr0wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:58.158050 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:35928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD9nbQATo66fKoS7w_rAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:59.463898 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:35934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD95qj1wV0Si-OkefbeQAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:39.722726 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:38688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEH3jZBu2q05ozVU9IAAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:42.119793 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:37888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEIo6lpbStxTqkSktgawAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:22:45.617921 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:54662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEJbysWC90G-1nBrA32QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:22:47.406218 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:37904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEJo6lpbStxTqkSktgdAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:52.911040 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:37322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEK5qj1wV0Si-OkefbjgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:57.323028 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEMXbQATo66fKoS7w_uAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:58.308421 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:37914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEMhXjF1vJNtV6CWrsEAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:23:01.614352 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:37052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgENRXjF1vJNtV6CWrsFgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:23:05.405976 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:46172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEObABkC4fWIHEf8HdtQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:22.930755 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:44454] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgESrABkC4fWIHEf8HdxQAAAEM"]
[Mon Mar 16 10:23:35.504561 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:46176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEV7ABkC4fWIHEf8Hd0QAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:38.807286 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:40930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEWnbQATo66fKoS7w_6AAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:40.091084 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:40944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEXI6lpbStxTqkSktgegAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:01.770123 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:37840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEcQlT9VtDQc7bgUye9QAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:04.148998 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:49762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEdLysWC90G-1nBrA37AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:05.481218 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:49766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEdXjZBu2q05ozVU9ICAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:08.001993 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:49778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEeNSswJuvopo3lOhSsQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:11.399379 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:49780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEe3jZBu2q05ozVU9ICwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:18.416842 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:54254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEgdSswJuvopo3lOhStgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:19.743334 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:54270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEg7ABkC4fWIHEf8Hd1wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:21.071739 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:56430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEhQlT9VtDQc7bgUye9gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:23.410411 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:56442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEhxXjF1vJNtV6CWrsIQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:27.991309 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:56454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEiwlT9VtDQc7bgUye-gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:32.363296 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:56462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEkLABkC4fWIHEf8Hd3AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:44.044776 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:44246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnP9ocpUE4ed4uDzf4AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:46.273110 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:39478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnhXjF1vJNtV6CWrsJgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:47.591956 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:39480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnxXjF1vJNtV6CWrsJwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:25:09.585380 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:39486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEtZqj1wV0Si-OkefcCwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:10.890326 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:49052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEtrABkC4fWIHEf8Hd4gAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:25:16.644168 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:49060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEvLysWC90G-1nBrA3-gAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:17.947376 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:49062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEvdSswJuvopo3lOhSvwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:54.906892 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.228.16:53910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgE4hXjF1vJNtV6CWrsNAAAAc4"]
[Mon Mar 16 10:26:18.670373 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:49076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgE-pqj1wV0Si-OkefcgAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:22.138889 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:47226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgE_tSswJuvopo3lOhSygAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:24.470993 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:48976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFALABkC4fWIHEf8Hd7QAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:25.744236 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:48990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFAY6lpbStxTqkSktgkQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:26.887624 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:48996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFAhXjF1vJNtV6CWrsNgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:34.659798 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFCv9ocpUE4ed4uDzgAAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:40.847126 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:42778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFEP9ocpUE4ed4uDzgCQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:48.670621 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:33178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFGNSswJuvopo3lOhS1QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:53.926990 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:33192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFHbABkC4fWIHEf8Hd9AAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:55.206946 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:47240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFH46lpbStxTqkSktglgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:56.527772 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:47256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIBXjF1vJNtV6CWrsPAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:57.738344 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:47262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIXbQATo66fKoS7xARAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:58.919774 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:47274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIglT9VtDQc7bgUyfgAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:00.072505 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:57428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFJHjZBu2q05ozVU9IMAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:01.240299 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:57442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFJXbQATo66fKoS7xARgAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:22.814632 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:57458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFOtSswJuvopo3lOhS6wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:25.223498 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:53692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPZqj1wV0Si-OkefcwgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:26.524946 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:53704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPhXjF1vJNtV6CWrsSQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:27.739847 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:53712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPxXjF1vJNtV6CWrsSgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:30.325034 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:53722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFQAlT9VtDQc7bgUyfhQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:31.699028 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:60494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFQxXjF1vJNtV6CWrsTAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:32.822202 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:60502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFRI6lpbStxTqkSktgngAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:34.095234 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:60518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFRglT9VtDQc7bgUyfhgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:35.294005 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:60528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFR7ysWC90G-1nBrA4FQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:36.431361 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:60530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFSNSswJuvopo3lOhS7QAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:37.720505 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:60540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFSZqj1wV0Si-OkefcyAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:41.385261 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:60546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFTf9ocpUE4ed4uDzgTQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:42.729670 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:52720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFTnbQATo66fKoS7xAUwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:43.948351 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:52734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFT3jZBu2q05ozVU9IQwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:45.243471 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:52736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFUZqj1wV0Si-OkefcygAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:45.916228 2026] [access_compat:error] [pid 10651:tid 140411590858496] [client 34.82.116.6:49356] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:27:46.535947 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:52742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFUglT9VtDQc7bgUyfiQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:48.992794 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:52748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFVI6lpbStxTqkSktgpAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:50.366223 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:51606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFVnbQATo66fKoS7xAVQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:51.501889 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:51608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFV46lpbStxTqkSktgpQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:52.758671 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:51614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFWI6lpbStxTqkSktgpgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:53.910711 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:51624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFWZqj1wV0Si-OkefcywAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:55.202779 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:51630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFW7ysWC90G-1nBrA4HQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:56.540435 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:51638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFXLysWC90G-1nBrA4HgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:57.859073 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:51648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFXbysWC90G-1nBrA4IAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:59.200435 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:51652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFX5qj1wV0Si-OkefczgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:13.625561 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:52500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFbXjZBu2q05ozVU9IUwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:16.015781 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:41982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcBXjF1vJNtV6CWrsUgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:17.320555 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:41996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcQlT9VtDQc7bgUyfkgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:18.723270 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:41998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcnbQATo66fKoS7xAWAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:22.978046 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:60034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgFdglT9VtDQc7bgUyfmQAAAQs"]
[Mon Mar 16 10:28:26.590356 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:42008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFepqj1wV0Si-Okefc1gAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:27.870790 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:57556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFe9SswJuvopo3lOhS9AAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:30.253651 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:57570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFfv9ocpUE4ed4uDzgZQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:35.386450 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:39280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFg_9ocpUE4ed4uDzgawAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:28:36.340550 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:51922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFhLysWC90G-1nBrA4RAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:28:37.616244 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:56278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFhXbQATo66fKoS7xAWgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:28:44.255139 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:39292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFjI6lpbStxTqkSktgsQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:29:13.583183 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:57894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFqbABkC4fWIHEf8HegQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:29:17.021274 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:59648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFrQlT9VtDQc7bgUyfogAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:15.768913 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:37226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF53jZBu2q05ozVU9IwAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:17.127482 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:39334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6bysWC90G-1nBrA4ZQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:18.404655 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:39486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6v9ocpUE4ed4uDzghwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:19.559298 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:39502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6wlT9VtDQc7bgUyfvQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:20.873688 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:39512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7HjZBu2q05ozVU9IwQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:21.311012 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7bABkC4fWIHEf8HfBgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:23.130880 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:39524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7wlT9VtDQc7bgUyfwQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:23.759540 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:49118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7xXjF1vJNtV6CWrsaQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:24.393343 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:39532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8Jqj1wV0Si-Okefc6wAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:25.680944 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:39548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8Zqj1wV0Si-Okefc7AAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:26.183315 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:49132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8o6lpbStxTqkSktgvgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:26.855457 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:39562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8o6lpbStxTqkSktgvwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:29.237894 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:52074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF9Zqj1wV0Si-Okefc7wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:30.493906 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:52088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF9v9ocpUE4ed4uDzgiQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:31.461447 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:49140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF95qj1wV0Si-Okefc8gAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:31.642539 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:52094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF95qj1wV0Si-Okefc8wAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:32.746187 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:39262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-Jqj1wV0Si-Okefc9wAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:32.907486 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:52108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-Jqj1wV0Si-Okefc-AAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:34.079568 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:52112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-rysWC90G-1nBrA4agAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:35.074611 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:39274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-9SswJuvopo3lOhTBQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:35.317694 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:52122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-_9ocpUE4ed4uDzgigAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:36.474500 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:52132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_HbQATo66fKoS7xAcAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:37.686911 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:52134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_dSswJuvopo3lOhTBgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:38.888007 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.241.46:33128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_hXjF1vJNtV6CWrsbAAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:41.243669 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:33144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGAdSswJuvopo3lOhTCQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:42.542581 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:33148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGAhXjF1vJNtV6CWrsbQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:44.760548 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:33156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBLysWC90G-1nBrA4bQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:44.936467 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:39280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBHjZBu2q05ozVU9IywAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:30:46.032001 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:33168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBpqj1wV0Si-Okefc-wAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:48.231417 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:33172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGCJqj1wV0Si-OkefdAgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:50.821287 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:35584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGCv9ocpUE4ed4uDzgjgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:52.146952 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:35594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGDHjZBu2q05ozVU9IzAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:53.288720 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:35596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGDQlT9VtDQc7bgUyfxgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:55.994017 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.228.16:56114] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgGD46lpbStxTqkSktgxQAAAlY"]
[Mon Mar 16 10:30:58.399145 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:42864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGEpqj1wV0Si-OkefdCgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:58.760916 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:35608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGEtSswJuvopo3lOhTEAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:00.108782 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:36114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFHjZBu2q05ozVU9IzwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:00.757938 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:50674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFLysWC90G-1nBrA4dAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:01.287027 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:36116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFf9ocpUE4ed4uDzgkAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:02.643318 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:36124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFhXjF1vJNtV6CWrscQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:08.729057 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:44190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGHJqj1wV0Si-OkefdFgAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:15.512926 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:36140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGI5qj1wV0Si-OkefdHQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:16.837922 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:34300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJNSswJuvopo3lOhTEwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:17.994872 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:54552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJf9ocpUE4ed4uDzgkQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:18.994593 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:44204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJglT9VtDQc7bgUyf2QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:31:20.663833 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:54568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKAlT9VtDQc7bgUyf3AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:21.379592 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:49320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKbysWC90G-1nBrA4eAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:23.350783 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:54580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKwlT9VtDQc7bgUyf4gAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:23.623187 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:49334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKwlT9VtDQc7bgUyf4wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:24.622192 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGLAlT9VtDQc7bgUyf5AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:28.338457 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:54608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMHjZBu2q05ozVU9I1gAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:29.647570 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:54350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMbABkC4fWIHEf8HfQAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:30.847297 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:54354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMnjZBu2q05ozVU9I1wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:35.212625 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:54358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGNwlT9VtDQc7bgUyf8gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:37.554365 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:54372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGOdSswJuvopo3lOhTFgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:42.134884 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:44122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGPpqj1wV0Si-OkefdJAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:42.376459 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:49350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGPglT9VtDQc7bgUyf-wAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:43.409117 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:44130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGP5qj1wV0Si-OkefdJQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:44.602246 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:44144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGQBXjF1vJNtV6CWrseAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:52.351308 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:44154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSLABkC4fWIHEf8HfXAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:53.659135 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:35212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSbysWC90G-1nBrA4hQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:54.843661 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:35214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSrysWC90G-1nBrA4hgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:56.117065 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:35220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGTJqj1wV0Si-OkefdJgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:08.650560 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:60986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGWBXjF1vJNtV6CWrskwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:32:08.752199 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:35222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGWHjZBu2q05ozVU9I6AAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:12.144151 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:32884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXI6lpbStxTqkSktg1gAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:13.067264 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:47606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXY6lpbStxTqkSktg2QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:32:14.583130 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:32892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXrABkC4fWIHEf8HfYQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:16.926862 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:32902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGYJqj1wV0Si-OkefdMQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:21.992466 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:56646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGZLysWC90G-1nBrA4qQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:24.704526 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:56660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGaNSswJuvopo3lOhTHAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:30.331639 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:56670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGbnjZBu2q05ozVU9I8gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:31.606873 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:60084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGb3bQATo66fKoS7xAgQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:32.650581 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:41156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcLysWC90G-1nBrA4vgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:33.798772 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:60092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcRXjF1vJNtV6CWrsmwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:33.959061 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:39040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcbABkC4fWIHEf8HfZgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:35.107383 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:60094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGc46lpbStxTqkSktg3AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:49.458208 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:60100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGgZqj1wV0Si-OkefdQgAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:50.754978 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGgo6lpbStxTqkSktg3QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:53.998705 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:42432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGhbABkC4fWIHEf8HfewAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:15.592813 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:42446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGm3bQATo66fKoS7xAlgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:16.843704 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:45494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGnHjZBu2q05ozVU9I_gAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:18.000294 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:52202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGnZqj1wV0Si-OkefdSgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:21.377026 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:52218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGoRXjF1vJNtV6CWrsqAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:25.040911 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.244.31:37640] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgGpRXjF1vJNtV6CWrsqQAAAdc"]
[Mon Mar 16 10:33:33.983167 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:52224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGrQlT9VtDQc7bgUygFAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:41.308519 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:49626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGtdSswJuvopo3lOhTMwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:55.590531 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:47662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGw7ysWC90G-1nBrA5IAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:59.169666 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:36492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGx5qj1wV0Si-OkefdVgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:07.249175 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:39044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGz7ABkC4fWIHEf8HfwQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:09.665496 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:45552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG0XjZBu2q05ozVU9JBQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:12.119699 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:41664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG1BXjF1vJNtV6CWrsrwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:14.440714 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:41670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG1v9ocpUE4ed4uDzgxwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:16.806610 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:41672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG2P9ocpUE4ed4uDzgywAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:18.091055 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG2tSswJuvopo3lOhTQAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:19.426016 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:41688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG27ysWC90G-1nBrA5PAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:22.993010 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:58900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG3tSswJuvopo3lOhTRgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:26.888641 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG4v9ocpUE4ed4uDzg1wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:28.067722 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:49610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG5P9ocpUE4ed4uDzg2gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:28.202386 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:58904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG5Jqj1wV0Si-OkefdWQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:31.039517 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:55472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG55qj1wV0Si-OkefdWwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:31.721835 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:58916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG53jZBu2q05ozVU9JCAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:34.187630 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:35062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG6nbQATo66fKoS7xAngAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:35.619239 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:55478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG63bQATo66fKoS7xAoAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:36.561338 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:35070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7I6lpbStxTqkSktg8QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:37.908211 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:35082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7XbQATo66fKoS7xAogAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:39.195391 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:35092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7xXjF1vJNtV6CWrstQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:41.499584 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG8RXjF1vJNtV6CWrsuQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:42.195560 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:55484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG8hXjF1vJNtV6CWrsugAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:43.568306 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:33168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG87ABkC4fWIHEf8HfxQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:44.015782 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:59488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9AlT9VtDQc7bgUygHwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:44.743028 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:33176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9I6lpbStxTqkSktg9AAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:46.023927 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:33184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9o6lpbStxTqkSktg9gAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:47.207166 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:33192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG93jZBu2q05ozVU9JDAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:49.591342 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:37510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-HjZBu2q05ozVU9JDQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:50.598982 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:59494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-o6lpbStxTqkSktg_gAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:50.942876 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:37514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-njZBu2q05ozVU9JDwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:52.139363 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:37516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_I6lpbStxTqkSktg_wAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:53.523531 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:37532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_XbQATo66fKoS7xApwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:54.652220 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.241.46:37540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_glT9VtDQc7bgUygIgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:55.145189 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:45800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_7ABkC4fWIHEf8HfzgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:56.935034 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:37546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAP9ocpUE4ed4uDzg3wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:57.504307 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:45810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAXbQATo66fKoS7xAqQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:58.807039 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:45814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAhXjF1vJNtV6CWrsvAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:59.292175 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:43156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHA5qj1wV0Si-OkefdYwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:02.482151 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:43162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHBHjZBu2q05ozVU9JEQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:04.904707 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:43176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHCHjZBu2q05ozVU9JEwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:06.233662 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHCnjZBu2q05ozVU9JFAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:07.491110 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:43200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHC5qj1wV0Si-OkefdaQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:08.764679 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:35612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHDJqj1wV0Si-OkefdawAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:10.100548 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:35616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHDo6lpbStxTqkSkthCAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:11.255111 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:35622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHD5qj1wV0Si-OkefdbwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:12.558394 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:35626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEHjZBu2q05ozVU9JFQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:13.711326 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:35642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEdSswJuvopo3lOhTbwAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:15.033563 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:35654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEwlT9VtDQc7bgUygKAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:16.201348 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:35670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHFAlT9VtDQc7bgUygKQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:18.511185 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:35674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHFhXjF1vJNtV6CWrsvgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:19.854106 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:41142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHF7ABkC4fWIHEf8Hf0gAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:22.064322 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:41144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHGglT9VtDQc7bgUygKwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:23.407237 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:41150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHGxXjF1vJNtV6CWrsvwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:24.542421 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:41160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHHI6lpbStxTqkSkthCwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:25.875537 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:41170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHHQlT9VtDQc7bgUygLAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:28.132619 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:41182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHIP9ocpUE4ed4uDzg4gAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:32.699536 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:38656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHJLABkC4fWIHEf8Hf1gAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:34.031053 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:38660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHJnbQATo66fKoS7xArwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:37.338418 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:38674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHKRXjF1vJNtV6CWrsxQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:38.577909 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:47698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHKtSswJuvopo3lOhThQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:47.673860 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHMwlT9VtDQc7bgUygOAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:51.080289 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:45040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHN3bQATo66fKoS7xAtQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:35:56.020835 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:45042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHO3bQATo66fKoS7xAuQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:57.030365 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:45822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHPZqj1wV0Si-OkefdmwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:35:57.278088 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.228.16:55762] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgHPbysWC90G-1nBrA5fwAAAYM"]
[Mon Mar 16 10:36:01.441061 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:38178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHQXjZBu2q05ozVU9JHwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:04.692549 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:45058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHRAlT9VtDQc7bgUygQwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:07.044596 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:37490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHR3jZBu2q05ozVU9JIgAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:08.374169 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:50408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSHjZBu2q05ozVU9JIwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:09.198845 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:37754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSRXjF1vJNtV6CWrszwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:10.583566 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:50424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSv9ocpUE4ed4uDzg6QAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:10.585833 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:37986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSo6lpbStxTqkSkthEAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:12.915637 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:50428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHTLABkC4fWIHEf8Hf4QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:13.955084 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:38002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHTbABkC4fWIHEf8Hf4gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:15.300285 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:50436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHT3jZBu2q05ozVU9JKQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:16.608903 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:50448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHUHjZBu2q05ozVU9JKwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:18.990384 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:38008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHUnjZBu2q05ozVU9JLQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:24.644927 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:47446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHWAlT9VtDQc7bgUygSwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:32.758921 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:50462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHYP9ocpUE4ed4uDzg_QAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:34.037110 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:41500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHYnjZBu2q05ozVU9JMAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:38.685019 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHZv9ocpUE4ed4uDzhAwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:38.772155 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:41510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHZtSswJuvopo3lOhTqwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:40.064525 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:33194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHaHjZBu2q05ozVU9JMgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:44.631695 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.241.46:37810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHbBXjF1vJNtV6CWrs1wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:47.891669 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:58650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHb_9ocpUE4ed4uDzhCgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:49.390491 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:37820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHcQlT9VtDQc7bgUygTwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:52.989655 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:57276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHdHjZBu2q05ozVU9JNwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:53.927222 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:58662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHddSswJuvopo3lOhTsgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:54.373951 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:57282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHdhXjF1vJNtV6CWrs3QAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:03.188219 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHf5qj1wV0Si-OkefdrAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:05.610466 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:36272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHgXjZBu2q05ozVU9JOwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:09.150935 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHhRXjF1vJNtV6CWrs5AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:11.538935 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:57296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHhrysWC90G-1nBrA5ngAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:21.377439 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:52186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHkf9ocpUE4ed4uDzhIAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:38.335086 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:51206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHov9ocpUE4ed4uDzhPQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:40.179411 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHo7ysWC90G-1nBrA5nwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:41.502335 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:53470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHpbysWC90G-1nBrA5oQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:44.324055 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:44514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqP9ocpUE4ed4uDzhQQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:45.653278 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:53474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqRXjF1vJNtV6CWrs6gAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:46.703797 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:34144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqrABkC4fWIHEf8HgBQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:48.263428 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHrLABkC4fWIHEf8HgBgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:54.386189 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:34158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHsnjZBu2q05ozVU9JSQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:38:09.923447 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:60744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHwbABkC4fWIHEf8HgGgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:38:11.252610 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:58568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHw7ysWC90G-1nBrA5qQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:13.425050 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:58580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHxZqj1wV0Si-OkefdxAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:38:25.348788 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.244.31:35428] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgH0f9ocpUE4ed4uDzhVAAAAhU"]
[Mon Mar 16 10:38:41.100191 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:53486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH4XbQATo66fKoS7xBEAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:42.430071 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:39418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH4o6lpbStxTqkSkthggAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:43.640542 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:39428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH47ysWC90G-1nBrA5rAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:40:13.564971 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:55572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIPdSswJuvopo3lOhT0QAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:40:58.678699 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.228.16:45018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgIanjZBu2q05ozVU9JkgAAAUo"]
[Mon Mar 16 10:42:18.189263 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIurABkC4fWIHEf8HgPAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:42:19.536244 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:55822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIu7ysWC90G-1nBrA5wwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:38.246511 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:32824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIzhXjF1vJNtV6CWrtEAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:46.387326 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:43120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI1tSswJuvopo3lOhT4wAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:59.054187 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:43136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI4xXjF1vJNtV6CWrtJAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:00.391422 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:45286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI5P9ocpUE4ed4uDziAgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:25.115308 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:42946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_bysWC90G-1nBrA5_gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:43:26.172609 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:45296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_nbQATo66fKoS7xBUQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:27.531126 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:44258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_3bQATo66fKoS7xBUwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:29.750365 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:47002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJARXjF1vJNtV6CWrtKQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:43:36.768584 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:36784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCHbQATo66fKoS7xBYQAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:38.056243 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCglT9VtDQc7bgUyhEQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:39.209059 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCwlT9VtDQc7bgUyhEgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:39.944188 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:38102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJC3bQATo66fKoS7xBaAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:43:40.528086 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:50212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJDAlT9VtDQc7bgUyhFQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:41.711244 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:50222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJDY6lpbStxTqkSktiDgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:03.081256 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:50228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJI3jZBu2q05ozVU9J-AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:04.425796 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:50610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJJNSswJuvopo3lOhT8gAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:11.235392 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:50626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJK5qj1wV0Si-OkeffAwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:13.555215 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:56650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJLZqj1wV0Si-OkeffCQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:14.899802 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:56656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJLglT9VtDQc7bgUyhHwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:16.039137 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:56666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJMLysWC90G-1nBrA6DAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:23.516950 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJN_9ocpUE4ed4uDziFQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:24.886999 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:36574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJONSswJuvopo3lOhT9wAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:28.123519 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJPNSswJuvopo3lOhT_AAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:30.890354 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:57396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJPo6lpbStxTqkSktiPgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:32.173000 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:33422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQHjZBu2q05ozVU9J_wAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:33.273016 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQQlT9VtDQc7bgUyhJAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:34.549302 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:33424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQnjZBu2q05ozVU9KAgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:34.567475 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:36376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQnjZBu2q05ozVU9KAwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:36.911367 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJRHjZBu2q05ozVU9KBwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:23.509908 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:36386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJc3jZBu2q05ozVU9KOAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:34.133403 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:54534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJff9ocpUE4ed4uDziLwAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:36.655321 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:34732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJf_9ocpUE4ed4uDziMQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:41.453430 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:51150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJhbysWC90G-1nBrA6LgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:02.234554 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.228.16:52090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgJmv9ocpUE4ed4uDziNgAAAgo"]
[Mon Mar 16 10:46:09.353254 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:51154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJoXbQATo66fKoS7xCFQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:10.666992 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:33590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJoglT9VtDQc7bgUyhTwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:16.758871 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:33596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJqNSswJuvopo3lOhUKgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:18.114503 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:44316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJqglT9VtDQc7bgUyhUAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:19.293698 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:44328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJq_9ocpUE4ed4uDziOAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:20.045221 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrHbQATo66fKoS7xCKQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:46:21.337293 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:35038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrRXjF1vJNtV6CWrtVwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:21.737972 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:44336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrQlT9VtDQc7bgUyhVQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:23.111653 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:44352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJr7ysWC90G-1nBrA6NQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:27.365332 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:35042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJs3jZBu2q05ozVU9KWQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:46:33.487177 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:35048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJuY6lpbStxTqkSktidQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:45.570469 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:43850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJxf9ocpUE4ed4uDziRQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:47:16.416981 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:52572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ5BXjF1vJNtV6CWrtdgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:25.550898 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:38988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ7f9ocpUE4ed4uDziWAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:34.091680 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:44358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ9o6lpbStxTqkSktiqwAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:38.719493 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ-v9ocpUE4ed4uDziXgAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:40.018712 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:36598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ_P9ocpUE4ed4uDziXwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:42.306511 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:36602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ_o6lpbStxTqkSktirQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:44.659307 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:36606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKAI6lpbStxTqkSktirwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:11.064768 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:36610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKGxXjF1vJNtV6CWrtkwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:18.419789 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:34494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKInbQATo66fKoS7xCngAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:27.812232 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.244.31:33398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgKK46lpbStxTqkSktitgAAAkM"]
[Mon Mar 16 10:49:04.195303 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKTrABkC4fWIHEf8HgwAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:49:05.563175 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:50796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKUZqj1wV0Si-OkeffegAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:49:23.907616 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:43548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKY_9ocpUE4ed4uDzirgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:30.199814 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:52558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKarABkC4fWIHEf8Hg0AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:40.225697 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:50812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKdNSswJuvopo3lOhUwAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:44.751823 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:33928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKeBXjF1vJNtV6CWrtoQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:49:50.259595 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:33932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKfrysWC90G-1nBrA6UQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:30.239825 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:50974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKprABkC4fWIHEf8HhBgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:31.599562 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKpwlT9VtDQc7bgUyhowAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:35.019913 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:35018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKq7ysWC90G-1nBrA6WQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:36.338718 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:35032] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKrLABkC4fWIHEf8HhCQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:47.187815 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:35036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKt9SswJuvopo3lOhUzwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:49.790535 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:56744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKuY6lpbStxTqkSktiyQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:51:02.295720 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.228.16:48200] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgKxrysWC90G-1nBrA6XwAAAYw"]
[Mon Mar 16 10:53:30.390352 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.244.31:33636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgLWrysWC90G-1nBrA6cAAAAZQ"]
[Mon Mar 16 10:54:50.057293 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:44036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLqnbQATo66fKoS7xDYgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:54:53.447592 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:34936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLrXbQATo66fKoS7xDZQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:54:54.766198 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:34950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLro6lpbStxTqkSktjTgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:55:15.925175 2026] [access_compat:error] [pid 10772:tid 140411716749056] [client 65.111.2.55:10455] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:16.869171 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 65.111.2.55:29997] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:17.846463 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 65.111.2.55:13393] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:25.426812 2026] [access_compat:error] [pid 32654:tid 140411708356352] [client 104.207.54.41:47161] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:26.318934 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 104.207.54.41:62447] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:27.194016 2026] [access_compat:error] [pid 32654:tid 140411641214720] [client 104.207.54.41:32785] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:56:06.456237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:42018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgL9Jqj1wV0Si-OkefgiQAAAA4"]
[Mon Mar 16 10:57:32.530588 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:50166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMTHbQATo66fKoS7xDnwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:57:33.795051 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:47680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMTXjZBu2q05ozVU9LWQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:12.570185 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:40806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMdHjZBu2q05ozVU9LhAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:13.859162 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:57738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMdXbQATo66fKoS7xDpwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:15.903837 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:57740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMd3bQATo66fKoS7xDqAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:17.243795 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:57750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMeXbQATo66fKoS7xDqgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:18.464980 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:57758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMerABkC4fWIHEf8HhbQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:19.707935 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMe_9ocpUE4ed4uDzi8QAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:21.215954 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:33082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMfY6lpbStxTqkSktjYwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:22.389270 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:33094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMfv9ocpUE4ed4uDzi8gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:23.671051 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:33106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMf46lpbStxTqkSktjZAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:24.844703 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:33116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMgLysWC90G-1nBrA6kwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:27.132240 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:33124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMg7ysWC90G-1nBrA6lQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:30.660631 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgMhpqj1wV0Si-Okefg2wAAAAs"]
[Mon Mar 16 10:58:31.918058 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:33128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMhwlT9VtDQc7bgUyjEwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:34.245333 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:60994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMirysWC90G-1nBrA6lwAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:35.550924 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMi9SswJuvopo3lOhV4gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:36.722507 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:60998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMjLysWC90G-1nBrA6mAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:39.160317 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:32780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMj_9ocpUE4ed4uDzi-QAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:41.551802 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:57490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMkf9ocpUE4ed4uDzi_QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:08.894155 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:57504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMrBXjF1vJNtV6CWrt_QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:10.270924 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:32878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMrv9ocpUE4ed4uDzjGQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:13.890414 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:32894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMsXbQATo66fKoS7xDsAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:15.187894 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:32908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMs3bQATo66fKoS7xDsQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:21.947185 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:32912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMuY6lpbStxTqkSktjcAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:24.514222 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:44622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMvLABkC4fWIHEf8HhsAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:26.917117 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:44632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMvglT9VtDQc7bgUyjGgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:28.310520 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:44648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMwAlT9VtDQc7bgUyjGwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:34.003099 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:39804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMxnbQATo66fKoS7xDuQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:36.298041 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:44650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMyAlT9VtDQc7bgUyjIwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:37.611424 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:39696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMyXbQATo66fKoS7xDugAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:44.750294 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM0BXjF1vJNtV6CWruBQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:51.142932 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:46340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM13jZBu2q05ozVU9LjwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:52.465921 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:52034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM2NSswJuvopo3lOhV7gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:53.803366 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:52040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM2XbQATo66fKoS7xDvwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:03.839707 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM446lpbStxTqkSktjfQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:05.209475 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:55126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM5bABkC4fWIHEf8HhzQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:06.487883 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:55136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM5pqj1wV0Si-Okefg5QAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:08.850694 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM6Jqj1wV0Si-Okefg5wAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:12.343330 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:55162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7Jqj1wV0Si-Okefg6wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:13.626679 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:56494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7QlT9VtDQc7bgUyjJwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:14.927539 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:56504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7tSswJuvopo3lOhV8AAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:17.188870 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:56518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM8XbQATo66fKoS7xDxAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:18.502586 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:56526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM8hXjF1vJNtV6CWruCQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:21.191627 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:56542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9bABkC4fWIHEf8Hh3wAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:22.508993 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:41676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9rysWC90G-1nBrA6pQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:23.849857 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:41690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9xXjF1vJNtV6CWruCgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:29.058462 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:41702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM_NSswJuvopo3lOhV9QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:30.387264 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:33376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM_nbQATo66fKoS7xDxgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:32.774413 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:33390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNAP9ocpUE4ed4uDzjYwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:34.076070 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNAo6lpbStxTqkSktjfgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:35.372181 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNA5qj1wV0Si-Okefg8AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:36.714177 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:33412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNBHbQATo66fKoS7xDxwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:41.997432 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:33418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNCRXjF1vJNtV6CWruEQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:44.282361 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:33422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNDAlT9VtDQc7bgUyjLgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:45.607656 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNDZqj1wV0Si-Okefg8wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:49.881690 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:33450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNEdSswJuvopo3lOhV-gAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:51.196549 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:46668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNEwlT9VtDQc7bgUyjNwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:58.897544 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:46684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNGrysWC90G-1nBrA6sAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:02.793814 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:46686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNHtSswJuvopo3lOhWAAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:04.133553 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:46670] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgNIAlT9VtDQc7bgUyjQgAAAQQ"]
[Mon Mar 16 11:01:07.193684 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:59640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNI3bQATo66fKoS7xDzgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:12.696073 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:59656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNKAlT9VtDQc7bgUyjSwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:16.165319 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:36876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNLHbQATo66fKoS7xD2AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:18.657462 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:36886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNLrysWC90G-1nBrA6swAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:19.984027 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:36898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNL7ABkC4fWIHEf8HiEgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:21.285813 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:41836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNMXjZBu2q05ozVU9LlgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:24.628762 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNNNSswJuvopo3lOhWBgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:27.030916 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:41862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNNwlT9VtDQc7bgUyjXgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:28.339390 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:41874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNOHbQATo66fKoS7xD2gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:32.928801 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:41888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNPP9ocpUE4ed4uDzjdAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:34.216377 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:35968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNPnjZBu2q05ozVU9LmAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:36.616961 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:35978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNQI6lpbStxTqkSktjhQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:37.956145 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:35992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNQdSswJuvopo3lOhWCAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:40.254015 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:36006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNRAlT9VtDQc7bgUyjagAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:42.043089 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:55058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNRRXjF1vJNtV6CWruFgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:43.393948 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:55070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNR3jZBu2q05ozVU9LmgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:46.762257 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:55080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNSnjZBu2q05ozVU9LnQAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:51.474689 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:55088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNTwlT9VtDQc7bgUyjegAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:02:00.952079 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:58318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNVxXjF1vJNtV6CWruHQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:02:08.918907 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:34130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNYLysWC90G-1nBrA6wwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:02:14.441134 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:40482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNZnbQATo66fKoS7xEDAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:22.618518 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 193.233.126.116:34002] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 11:02:26.431572 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:40488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNchXjF1vJNtV6CWruLwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:29.876871 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:34476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNdRXjF1vJNtV6CWruNQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:32.396607 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:51076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNeJqj1wV0Si-OkefhDAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:33.740654 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:51090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNebABkC4fWIHEf8HiKgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:35.055005 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNe7ysWC90G-1nBrA6xgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:37.310110 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:51104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNfLysWC90G-1nBrA6xwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:38.669331 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:51114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNfhXjF1vJNtV6CWruOwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:39.943326 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNf3bQATo66fKoS7xEJgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:41.178209 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:46734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgQlT9VtDQc7bgUyjrQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:42.472257 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:46746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgglT9VtDQc7bgUyjrwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:43.728741 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:46752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgwlT9VtDQc7bgUyjswAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:45.043718 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:46768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhQlT9VtDQc7bgUyjuAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:46.410237 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:46770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhglT9VtDQc7bgUyjvQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:47.663495 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:46786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhxXjF1vJNtV6CWruPAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:48.938304 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:46792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNiHbQATo66fKoS7xELwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:50.106221 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:39148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNirABkC4fWIHEf8HiMAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:51.413795 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:39160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNi5qj1wV0Si-OkefhDgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:52.707585 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:39164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNjHjZBu2q05ozVU9LrwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:54.017912 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:39178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNjrysWC90G-1nBrA6yAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:56.390108 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:39184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkLABkC4fWIHEf8HiMgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:57.663695 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:39186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkQlT9VtDQc7bgUyjyQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:58.822195 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:39192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkglT9VtDQc7bgUyjzAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:00.129304 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:39204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlJqj1wV0Si-OkefhFwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:01.430797 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:48550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlZqj1wV0Si-OkefhGAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:02.724790 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:48554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlhXjF1vJNtV6CWruPQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:04.024692 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:48564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmP9ocpUE4ed4uDzjgQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:05.349428 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:48580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmXjZBu2q05ozVU9LsAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:06.699570 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:48588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmv9ocpUE4ed4uDzjhAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:07.900597 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:48596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNm7ABkC4fWIHEf8HiNAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:09.084959 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:48600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNnbysWC90G-1nBrA6ygAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:10.406031 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:49794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNno6lpbStxTqkSktjkwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:11.691453 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:49800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNn3jZBu2q05ozVU9LsQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:13.038818 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:49814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNoXjZBu2q05ozVU9LswAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:14.354759 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:49820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNoglT9VtDQc7bgUyj1gAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:15.534860 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:49830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNowlT9VtDQc7bgUyj2gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:16.867361 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:49838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNpP9ocpUE4ed4uDzjhwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:20.529097 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNqBXjF1vJNtV6CWruTgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:32.105388 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:38812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNtJqj1wV0Si-OkefhLgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:03:32.506894 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:50666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgNtLABkC4fWIHEf8HiOgAAAEs"]
[Mon Mar 16 11:03:43.945057 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:52538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNv_9ocpUE4ed4uDzjnwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:45.232520 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:48412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNwbysWC90G-1nBrA6zwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:03:58.945394 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:48424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNzglT9VtDQc7bgUyj8AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:04:33.808863 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgN8QlT9VtDQc7bgUykDgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:04:40.639310 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgN-LysWC90G-1nBrA63wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:04:50.099267 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:56210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOAnbQATo66fKoS7xEbwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:05:29.615942 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:55500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOKY6lpbStxTqkSktjzgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:06:04.893195 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.228.16:32780] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgOTLABkC4fWIHEf8HiUAAAAEc"]
[Mon Mar 16 11:06:53.556877 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:58418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOfXbQATo66fKoS7xE0gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:04.879434 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:33850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOiBXjF1vJNtV6CWrudwAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:08.321659 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:32788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOjHjZBu2q05ozVU9L5gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:12.900113 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:44522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOkP9ocpUE4ed4uDzkfAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:34.415598 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:44532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOpglT9VtDQc7bgUykQgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:40.952076 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:49220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOrJqj1wV0Si-OkefhZwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:42.344292 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:60218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOrnbQATo66fKoS7xE3AAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:08:10.742988 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:45950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOyo6lpbStxTqkSktkNwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:32.972984 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.244.31:45700] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgO4HjZBu2q05ozVU9MKwAAAUo"]
[Mon Mar 16 11:08:50.721917 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:60222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO8o6lpbStxTqkSktkYQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:52.023572 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:43538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9Jqj1wV0Si-OkefhagAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:53.301418 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:43546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9RXjF1vJNtV6CWruiwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:54.435834 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:43552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9njZBu2q05ozVU9MRQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:55.722806 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:43560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO93bQATo66fKoS7xFEAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:56.863708 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:43566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO-AlT9VtDQc7bgUykSgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:59.122993 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:43574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO-nbQATo66fKoS7xFEwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:00.168950 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:39082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_HbQATo66fKoS7xFFQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:00.470721 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:53380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_AlT9VtDQc7bgUykTQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:01.799108 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:53384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_XbQATo66fKoS7xFFwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:03.092894 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:53394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO__9ocpUE4ed4uDzkkwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:04.427380 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:53396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPANSswJuvopo3lOhWvQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:05.700294 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:38160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAbysWC90G-1nBrA7YAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:05.716568 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:53402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAf9ocpUE4ed4uDzklAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:07.084549 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:53412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAwlT9VtDQc7bgUykUQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:08.439398 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:53414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBNSswJuvopo3lOhWvgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:09.571925 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:53430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBbysWC90G-1nBrA7YQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:10.838502 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:35052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBglT9VtDQc7bgUykVgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:12.184928 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:35064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCAlT9VtDQc7bgUykWQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:12.707466 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:38172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCAlT9VtDQc7bgUykWgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:13.475686 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:35072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCQlT9VtDQc7bgUykWwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:14.778597 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:35076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPChXjF1vJNtV6CWrujAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:16.081803 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:35088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDLABkC4fWIHEf8HieAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:17.422575 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:35104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDbysWC90G-1nBrA7ZwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:18.778877 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:35120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDhXjF1vJNtV6CWrujQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:19.520542 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:55248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPD7ysWC90G-1nBrA7agAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:20.075356 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:35124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPELysWC90G-1nBrA7awAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:20.570647 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:40696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPELysWC90G-1nBrA7bAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:22.224309 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:40702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPErABkC4fWIHEf8HieQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:23.769562 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:40718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPExXjF1vJNtV6CWrujgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:25.048785 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:49948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFf9ocpUE4ed4uDzkmQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:25.279368 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:40724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFdSswJuvopo3lOhWwAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:26.822643 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:40726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFnbQATo66fKoS7xFGgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:28.372932 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:40736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPGHjZBu2q05ozVU9MYwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:29.960639 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:40740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPGXjZBu2q05ozVU9MaAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:31.432532 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:45526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPG3jZBu2q05ozVU9MawAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:33.796117 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:49960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPHXjZBu2q05ozVU9McAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:34.320009 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:45536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPHhXjF1vJNtV6CWrukQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:36.083479 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:45548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPII6lpbStxTqkSktkZQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:37.588947 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:45556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPIXjZBu2q05ozVU9MdAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:39.054898 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:45566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPI7ABkC4fWIHEf8HifAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:40.475548 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:51498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJAlT9VtDQc7bgUykXwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:41.955411 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:51514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJQlT9VtDQc7bgUykYAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:43.470383 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:51526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJ_9ocpUE4ed4uDzkmwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:45.749961 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:51528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPKdSswJuvopo3lOhWwgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:47.422367 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:51532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPKwlT9VtDQc7bgUykYQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:48.636006 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:58574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLBXjF1vJNtV6CWruoAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:48.731670 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:51546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLHjZBu2q05ozVU9MfQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:49.996356 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:51560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLXjZBu2q05ozVU9MgQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:51.439942 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:49824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPL3jZBu2q05ozVU9MhAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:52.755224 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:49832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPMLysWC90G-1nBrA7bwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:54.126448 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:49840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPMnjZBu2q05ozVU9MiQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:55.403446 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPM5qj1wV0Si-OkefhcAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:56.758068 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:49868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPNHbQATo66fKoS7xFHQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:58.041399 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:49870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPNrysWC90G-1nBrA7cAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:59.395220 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:49880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPN3jZBu2q05ozVU9MlQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:00.733383 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:57284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPOJqj1wV0Si-OkefhcQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:02.547221 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:57294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPOo6lpbStxTqkSktkawAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:03.895525 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:57304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPO_9ocpUE4ed4uDzkngAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:05.222694 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:57306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPPdSswJuvopo3lOhWxQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:07.649362 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:57318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPP7ysWC90G-1nBrA7cgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:09.180250 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:57324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQdSswJuvopo3lOhWxgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:10.349864 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQhXjF1vJNtV6CWruogAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:11.684207 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:51912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQ3bQATo66fKoS7xFIgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:11.820109 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:37716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQ3jZBu2q05ozVU9MqgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:12.956440 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:51914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPRLysWC90G-1nBrA7dAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:14.268985 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:51928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPRtSswJuvopo3lOhWxwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:15.622376 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:51940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPR7ABkC4fWIHEf8HifgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:16.931368 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:51942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPSLysWC90G-1nBrA7dgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:18.092575 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:51958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPShXjF1vJNtV6CWrupAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:30.671690 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPVnjZBu2q05ozVU9MyQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:34.063486 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:53352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPWhXjF1vJNtV6CWruqQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:42.434949 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPYZqj1wV0Si-OkefhlQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:54.436899 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:34660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPbpqj1wV0Si-OkefhrgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:10:58.924214 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:55152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPcnbQATo66fKoS7xFKgAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:11:01.633345 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:49078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPdJqj1wV0Si-OkefhtAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:12.735291 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:51806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPgJqj1wV0Si-OkefhzwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:16.230291 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:49092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPhJqj1wV0Si-Okefh0wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:18.227156 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:46942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPhtSswJuvopo3lOhW1AAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:25.789270 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:41962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPjbysWC90G-1nBrA7gQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:26.358511 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:43348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPjo6lpbStxTqkSktkfgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:48.622333 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:57684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPpP9ocpUE4ed4uDzktwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:10.392045 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:36240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPuhXjF1vJNtV6CWruywAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:12:18.295145 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:49804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPwnjZBu2q05ozVU9NJgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:19.690897 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:49814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPw3bQATo66fKoS7xFYQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:26.576421 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:40372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPypqj1wV0Si-OkefiDAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:12:32.087094 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:43358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP0HbQATo66fKoS7xFbgAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:33.448904 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:40384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP0XjZBu2q05ozVU9NLQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:12:39.229366 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:54180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP1wlT9VtDQc7bgUykhQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:35.941238 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQDwlT9VtDQc7bgUykyAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:36.326119 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:52384] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgQELABkC4fWIHEf8HijgAAAEI"]
[Mon Mar 16 11:13:37.232326 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:58854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQEZqj1wV0Si-OkefikAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:37.671204 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:37700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQEZqj1wV0Si-OkefikgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:38.971755 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:43974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQErABkC4fWIHEf8HikQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:50.728192 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:43986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQHrABkC4fWIHEf8HinAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:56.378524 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:58856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQJNSswJuvopo3lOhW7wAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:14:00.592904 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:40780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQKJqj1wV0Si-OkefirwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:04.127497 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:32796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQLBXjF1vJNtV6CWru0QAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:07.669651 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:32802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQL46lpbStxTqkSktkjAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:53.250635 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:44990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQXZqj1wV0Si-Okefi4gAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:04.459720 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:39924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQaLysWC90G-1nBrA7wwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:13.235560 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:60992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQcXjZBu2q05ozVU9NTAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:14.529851 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:34444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQcnbQATo66fKoS7xFhAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:15.821195 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQc3jZBu2q05ozVU9NTgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:15:18.044145 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.241.46:55786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQdnbQATo66fKoS7xFiAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:22.658612 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:55354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQeglT9VtDQc7bgUyk2AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:32.467874 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:55356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQhLABkC4fWIHEf8HirgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:35.274888 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:39158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQhxXjF1vJNtV6CWru4QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:37.687561 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:39172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQibABkC4fWIHEf8HisAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:15:39.005479 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:53420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQi5qj1wV0Si-Okefi6wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:40.271610 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:53430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQjHbQATo66fKoS7xFiQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:51.163955 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:53442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQl7ysWC90G-1nBrA7zQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:58.665685 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:34470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQnnjZBu2q05ozVU9NdwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:00.912081 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:52526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQoBXjF1vJNtV6CWru5AAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:04.339933 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:40476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQowlT9VtDQc7bgUyk7QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:09.353059 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:51202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQp9SswJuvopo3lOhW-wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:09.357474 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:38492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQqI6lpbStxTqkSktklgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:12.904013 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:40796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQrLysWC90G-1nBrA71gAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 11:16:18.300942 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:58298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQsnbQATo66fKoS7xFlAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:20.039119 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:58302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQsxXjF1vJNtV6CWrvFQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:21.398582 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:49884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQtXjZBu2q05ozVU9NegAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:22.683219 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:49894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQtrABkC4fWIHEf8HitAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:23.845639 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQt3jZBu2q05ozVU9NewAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:25.154319 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:49908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQuQlT9VtDQc7bgUylIAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:26.437603 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQuv9ocpUE4ed4uDzlSgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:28.660997 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:49922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvI6lpbStxTqkSktkmQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:29.961397 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:49938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvZqj1wV0Si-Okefi8gAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:31.408399 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:40812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvhXjF1vJNtV6CWrvIAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:42.962058 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:39128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQynjZBu2q05ozVU9NhwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:44.271842 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:54320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQzJqj1wV0Si-Okefi9gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:46.383114 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:54322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQzbABkC4fWIHEf8HiuwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:47.673627 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:54330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQz3jZBu2q05ozVU9NiAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:48.960314 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:54332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ0Jqj1wV0Si-Okefi-AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:50.283360 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:33742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ0hXjF1vJNtV6CWrvJQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:51.514048 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:33758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ07ABkC4fWIHEf8HivAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:52.781443 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:33766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ1P9ocpUE4ed4uDzlTgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:55.426429 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:33774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ1glT9VtDQc7bgUylTQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:56.769498 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:33790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ2AlT9VtDQc7bgUylUgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:58.031328 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ2nbQATo66fKoS7xFmwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:59.329702 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ27ABkC4fWIHEf8HivQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:00.673243 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:38406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ3P9ocpUE4ed4uDzlUwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:02.006989 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ3pqj1wV0Si-Okefi-gAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:03.408491 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:38436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ33bQATo66fKoS7xFnQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:04.723431 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:38452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ4I6lpbStxTqkSktkoQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:05.987323 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:38458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ4RXjF1vJNtV6CWrvJgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:07.375908 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:38464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ49SswJuvopo3lOhXDQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:08.573347 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:38472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ5LysWC90G-1nBrA8BAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:09.871036 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:38478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ5XbQATo66fKoS7xFnwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:11.167001 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:48922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ53bQATo66fKoS7xFoQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:12.442794 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:48924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6LABkC4fWIHEf8HiwwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:13.758978 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:48926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6XjZBu2q05ozVU9NjgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:15.047322 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:48940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6xXjF1vJNtV6CWrvKAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:16.149777 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:48942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7I6lpbStxTqkSktkowAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:17.546020 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:48946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7bABkC4fWIHEf8HixAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:18.826908 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:48950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7pqj1wV0Si-Okefi_wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:21.159377 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:53592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ8P9ocpUE4ed4uDzlVgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:22.496967 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:53604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ8rABkC4fWIHEf8HixQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:23.771179 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ83jZBu2q05ozVU9NjwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:25.081087 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:53626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9Zqj1wV0Si-OkefjAAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:26.375672 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:53636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9glT9VtDQc7bgUyldwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:27.686189 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:53640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9wlT9VtDQc7bgUylegAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:28.993220 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:53654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-AlT9VtDQc7bgUylfAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:30.280524 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:53030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-pqj1wV0Si-OkefjAQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:31.602817 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-3bQATo66fKoS7xFqAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:32.769215 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:53038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_LABkC4fWIHEf8HixwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:34.059309 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:53046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_rABkC4fWIHEf8HiyAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:35.039223 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.241.46:51076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_wlT9VtDQc7bgUyliAAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:17:35.336167 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:53052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_46lpbStxTqkSktkpAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:36.599357 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:53056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRALABkC4fWIHEf8HiygAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:37.928011 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:53070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRARXjF1vJNtV6CWrvLAAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:39.211182 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:53080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRA3jZBu2q05ozVU9NkgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:40.510827 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:58184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRBI6lpbStxTqkSktkpQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:41.846398 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:58198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRBbABkC4fWIHEf8HiywAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:43.140770 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:58210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRB_9ocpUE4ed4uDzlYAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:43.297248 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:45854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRB_9ocpUE4ed4uDzlYQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:17:44.416868 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:58218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRCJqj1wV0Si-OkefjAwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:45.752215 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:58232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRCXjZBu2q05ozVU9NlAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:47.699513 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:44336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRC3bQATo66fKoS7xFrgAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:17:48.124088 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:58244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDI6lpbStxTqkSktkqQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:49.423130 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:58246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDRXjF1vJNtV6CWrvLgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:50.737032 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:59432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDglT9VtDQc7bgUyliQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:53.269949 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:59442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgREHjZBu2q05ozVU9NlQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:54.598205 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:59454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRErABkC4fWIHEf8HizAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:55.716943 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:59460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgREwlT9VtDQc7bgUyligAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:56.006382 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:59460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFAlT9VtDQc7bgUyliwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:56.387856 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:33452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFI6lpbStxTqkSktksAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:17:57.294570 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:59472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFZqj1wV0Si-OkefjBgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:58.611049 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:59474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFtSswJuvopo3lOhXFQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:59.939694 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFwlT9VtDQc7bgUyljAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:01.206521 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:51286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGXbQATo66fKoS7xFsAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:02.623260 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:51296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGhXjF1vJNtV6CWrvMQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:03.816179 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:51310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGxXjF1vJNtV6CWrvMgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:05.143934 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:51316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHXjZBu2q05ozVU9NlwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:06.408746 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:51322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHhXjF1vJNtV6CWrvMwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:07.704785 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:51332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHwlT9VtDQc7bgUyljgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:09.039316 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:51340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRIbABkC4fWIHEf8Hi2QAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:10.361177 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:53170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRInjZBu2q05ozVU9NmAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:11.622636 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:53174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRI5qj1wV0Si-OkefjBwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:12.826363 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:53190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJAlT9VtDQc7bgUylkAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:14.167373 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:53200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJglT9VtDQc7bgUylkgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:15.382064 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:53214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJ46lpbStxTqkSktksQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:16.673934 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:53228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRKNSswJuvopo3lOhXGwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:17.983006 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:53238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRKXbQATo66fKoS7xFswAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:19.129308 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:53244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRK7ABkC4fWIHEf8Hi4wAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:20.333654 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:58252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLLABkC4fWIHEf8Hi5gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:21.633584 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:58260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLQlT9VtDQc7bgUyllQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:22.924659 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:58270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLglT9VtDQc7bgUyllwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:24.225883 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:58276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMAlT9VtDQc7bgUylmAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:25.610870 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:33458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMbABkC4fWIHEf8Hi6gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:18:27.630719 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:58284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMwlT9VtDQc7bgUylmwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:18:50.318385 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:56524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRSo6lpbStxTqkSktkyAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:18:53.704884 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:44352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRTbysWC90G-1nBrA8PwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:23.319224 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:44356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRa3bQATo66fKoS7xF0QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:28.144585 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:58298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRcNSswJuvopo3lOhXiAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:36.350909 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgReLABkC4fWIHEf8Hi8wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:19:37.744889 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:44252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgReQlT9VtDQc7bgUylqgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:40.779979 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:44432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRfI6lpbStxTqkSktk0AAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:44.095120 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:42434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRgAlT9VtDQc7bgUylrQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:45.564894 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRgQlT9VtDQc7bgUylrgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:19:57.224146 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:42444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRjXjZBu2q05ozVU9N1wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:02.959675 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:57518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRkv9ocpUE4ed4uDzleQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:12.776743 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:44354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRnAlT9VtDQc7bgUyltQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:15.403728 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:48168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRn5qj1wV0Si-OkefjIQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:17.756862 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:48174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRoY6lpbStxTqkSktk1AAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:24.113342 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:56714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRqHjZBu2q05ozVU9N9QAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:36.340889 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:51040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRtLysWC90G-1nBrA8YgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:37.664036 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:40438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRtRXjF1vJNtV6CWrvRAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:20:48.778537 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:45448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwLABkC4fWIHEf8HjCAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:20:49.969853 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:42894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwQlT9VtDQc7bgUylugAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:20:51.091448 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:42898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwwlT9VtDQc7bgUyluwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:21:15.180428 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:47304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgR2XjZBu2q05ozVU9N9wAAAUQ"]
[Mon Mar 16 11:23:39.142029 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.244.31:55968] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgSa_9ocpUE4ed4uDzl2QAAAhI"]
[Mon Mar 16 11:24:03.685555 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:60034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSg3jZBu2q05ozVU9OTgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:04.961909 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:36754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgShAlT9VtDQc7bgUymOAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:06.143881 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:36764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgShrysWC90G-1nBrA81QAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:07.394721 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:36780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSh3bQATo66fKoS7xF-gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:16.411149 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:33652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSkHjZBu2q05ozVU9OVgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:53.655199 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgStbABkC4fWIHEf8HjSQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:26:16.149584 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:41384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgTCHjZBu2q05ozVU9OZQAAAUE"]
[Mon Mar 16 11:27:29.168052 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:34702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTUQlT9VtDQc7bgUymjgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:30.498827 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:45710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTUo6lpbStxTqkSktlaQAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:31.640695 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTU_9ocpUE4ed4uDznHgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:32.917080 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:45722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTVJqj1wV0Si-Okefj1gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:34.206098 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:45730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTVnbQATo66fKoS7xGHgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:35.308723 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:45742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTV46lpbStxTqkSktlagAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:36.523242 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:45750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWNSswJuvopo3lOhX6QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:37.834454 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:45754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWbABkC4fWIHEf8HjWAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:39.147411 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:37276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWwlT9VtDQc7bgUymmAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:40.300344 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:37280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXJqj1wV0Si-Okefj2QAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:41.650067 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:37288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXQlT9VtDQc7bgUymmwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:42.841871 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:37300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXpqj1wV0Si-Okefj2wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:43.115704 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:37300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTX5qj1wV0Si-Okefj3QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:44.427854 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:37308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTYP9ocpUE4ed4uDznKwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:50.181406 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:37318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTZpqj1wV0Si-Okefj4gAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:51.413279 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:57356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTZwlT9VtDQc7bgUympwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:52.615898 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:57370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTaLABkC4fWIHEf8HjXQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:53.933678 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTaQlT9VtDQc7bgUymqwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:55.087263 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:57384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTawlT9VtDQc7bgUymrQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:56.379281 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:57398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbAlT9VtDQc7bgUymrwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:57.561116 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:57410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbZqj1wV0Si-Okefj4wAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:58.924673 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:60154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbrABkC4fWIHEf8HjXgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:00.066666 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:60166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTcJqj1wV0Si-Okefj5QAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:03.858644 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:60174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTc7ABkC4fWIHEf8HjYQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:05.142619 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:60184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTdbABkC4fWIHEf8HjZAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:06.322129 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:60186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTdrysWC90G-1nBrA88gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:07.603043 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:60202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTd9SswJuvopo3lOhX7QAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:08.833980 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:47188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTeLysWC90G-1nBrA88wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:10.067356 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:47200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTetSswJuvopo3lOhX7wAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:11.359870 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:47202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTexXjF1vJNtV6CWrvyQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:12.514844 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:47204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTfBXjF1vJNtV6CWrvygAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:13.702133 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:47208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTfZqj1wV0Si-Okefj6AAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:14.889815 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:47218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTftSswJuvopo3lOhX8AAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:16.206092 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:47234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgBXjF1vJNtV6CWrvywAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:17.376083 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:47246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgbysWC90G-1nBrA89AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:18.551442 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:55858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgtSswJuvopo3lOhX8QAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:30.493515 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:50394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTjo6lpbStxTqkSktlggAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:31.847824 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTj3jZBu2q05ozVU9OgwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:33.173695 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:58922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTkXjZBu2q05ozVU9OhgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:34.482639 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:58930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTkglT9VtDQc7bgUym0gAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:35.776673 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:58932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTk7ABkC4fWIHEf8HjaAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:37.066689 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:58936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTlZqj1wV0Si-Okefj7QAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:39.255741 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:58946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTlglT9VtDQc7bgUym2QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:40.567057 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:48722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmBXjF1vJNtV6CWrvzQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:41.659482 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmf9ocpUE4ed4uDznRAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:42.985096 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:48738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmnbQATo66fKoS7xGJAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:44.187375 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:48752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnAlT9VtDQc7bgUym4AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:44.238852 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:36668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgTnLABkC4fWIHEf8HjawAAAEs"]
[Mon Mar 16 11:28:45.520779 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:48756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnRXjF1vJNtV6CWrvzwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:46.860701 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:48772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnhXjF1vJNtV6CWrv0QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:48.176921 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:48788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgToHjZBu2q05ozVU9OlAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:49.475171 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:48796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTobysWC90G-1nBrA89wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:50.988110 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:48914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTorysWC90G-1nBrA8-QAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:52.262940 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:48926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTpI6lpbStxTqkSktlhgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:53.549438 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:48930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTpZqj1wV0Si-Okefj8QAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:54.906532 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:48946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTptSswJuvopo3lOhX9gAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:57.247469 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:48956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTqXbQATo66fKoS7xGKQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:58.556467 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:48962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTqtSswJuvopo3lOhX9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:59.888363 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:48968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTq7ABkC4fWIHEf8HjbAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:01.136364 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:37078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTrRXjF1vJNtV6CWrv0wAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:02.284817 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:37090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTrhXjF1vJNtV6CWrv1AAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:03.627602 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:37106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTr7ysWC90G-1nBrA8-gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:04.901106 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:37114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTsHjZBu2q05ozVU9OpQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:06.132259 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 185.177.72.22:44514] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 11:29:06.187272 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:37128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTsrysWC90G-1nBrA8_AAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:07.499371 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:37136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTs5qj1wV0Si-Okefj9gAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:08.854239 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:37142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTtJqj1wV0Si-Okefj9wAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:10.872486 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:38130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTtpqj1wV0Si-Okefj-QAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:12.166823 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:38144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTuJqj1wV0Si-Okefj-gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:13.484907 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:38150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTuQlT9VtDQc7bgUym8gAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:14.781511 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:38156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTutSswJuvopo3lOhX-QAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:15.906105 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:38170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTu3bQATo66fKoS7xGLQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:17.185938 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:38178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTvRXjF1vJNtV6CWrv1gAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:19.513417 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:38180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTv7ABkC4fWIHEf8HjcgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:20.810603 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTwI6lpbStxTqkSktljgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:21.991838 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:53144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTwY6lpbStxTqkSktljwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:23.319412 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTw46lpbStxTqkSktlkQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:24.496569 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:53152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxP9ocpUE4ed4uDznWQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:25.766312 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:53154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxXbQATo66fKoS7xGLwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:26.895278 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:53166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxv9ocpUE4ed4uDznXQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:28.163119 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:53168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTyJqj1wV0Si-Okefj_AAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:29.458999 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTybABkC4fWIHEf8HjcwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:30.635771 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:37016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTytSswJuvopo3lOhYAAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:31.933526 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:37018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTywlT9VtDQc7bgUym_QAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:33.208707 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:37026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTzZqj1wV0Si-OkefkAAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:36.030784 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:37032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTzwlT9VtDQc7bgUynAAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:37.291479 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:37044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT0QlT9VtDQc7bgUynAgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:39.647900 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:37058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT07ysWC90G-1nBrA9BAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:40.983075 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:50866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT1Jqj1wV0Si-OkefkBAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:42.194384 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:50876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT1nbQATo66fKoS7xGOAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:44.415756 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:55860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2HjZBu2q05ozVU9OzgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:29:45.731137 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:34926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2QlT9VtDQc7bgUynBQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:29:45.904961 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:50892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2QlT9VtDQc7bgUynBgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:47.177845 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:50900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT25qj1wV0Si-OkefkBwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:48.322683 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:50904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3NSswJuvopo3lOhYAgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:49.635078 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:50910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3bABkC4fWIHEf8HjdwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:50.911700 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3rysWC90G-1nBrA9BwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:53.331218 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:56390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT4QlT9VtDQc7bgUynCAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:54.754932 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:56406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT4tSswJuvopo3lOhYAwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:55.919632 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:56408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT47ysWC90G-1nBrA9CAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:57.215818 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:56412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT5QlT9VtDQc7bgUynCQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:59.551172 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:56416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT57ysWC90G-1nBrA9CwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:00.882582 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:39420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT6NSswJuvopo3lOhYBwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:05.747154 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:39432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT7QlT9VtDQc7bgUynDwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:07.079780 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:39434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT75qj1wV0Si-OkefkHgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:08.397556 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:39444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT8Jqj1wV0Si-OkefkJAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:09.742993 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:39454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT8bABkC4fWIHEf8HjewAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:11.051081 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:52120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT85qj1wV0Si-OkefkKgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:13.326319 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT9dSswJuvopo3lOhYCwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:14.613388 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:52130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT9o6lpbStxTqkSktlmwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:15.972461 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:52146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT99SswJuvopo3lOhYDAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:17.387146 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:52150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-f9ocpUE4ed4uDznjAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:19.743167 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:52156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-wlT9VtDQc7bgUynEQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:19.783755 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:34930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-5qj1wV0Si-OkefkMwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:21.028510 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:42590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT_XjZBu2q05ozVU9O0gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:21.119614 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT_bABkC4fWIHEf8HjfQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:29.115241 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:42602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUBRXjF1vJNtV6CWrv8AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:30.430581 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:54682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUBtSswJuvopo3lOhYDQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:33.963914 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:54684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUCZqj1wV0Si-OkefkNwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:41.753067 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUEXjZBu2q05ozVU9O6wAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:42.798380 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:39988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUEnjZBu2q05ozVU9O7QAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:44.222541 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:33402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUFLABkC4fWIHEf8HjgAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:30:55.217488 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:36472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUH7ysWC90G-1nBrA9HQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:57.252394 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUIXbQATo66fKoS7xGWAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:00.625136 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:44676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJJqj1wV0Si-OkefkQQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:01.023325 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:46974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJQlT9VtDQc7bgUynJgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:03.007446 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:44682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJ_9ocpUE4ed4uDznvQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:05.535116 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:44692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUKQlT9VtDQc7bgUynLAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:06.869587 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:44708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUKpqj1wV0Si-OkefkQwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:10.240889 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:33644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgULpqj1wV0Si-OkefkRgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:11.516320 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:33656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgULwlT9VtDQc7bgUynNAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:16.622837 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.228.16:48078] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgUNAlT9VtDQc7bgUynNwAAAQI"]
[Mon Mar 16 11:31:17.287235 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUNZqj1wV0Si-OkefkTQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:19.684485 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:53960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUN9SswJuvopo3lOhYFwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:41.224376 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:53974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUTbABkC4fWIHEf8HjoAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:50.204328 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:59332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUVglT9VtDQc7bgUynSgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:54.183459 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:40840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUWnbQATo66fKoS7xGcQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:56.252121 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUW7ABkC4fWIHEf8HjpQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:39.410096 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:40852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUhv9ocpUE4ed4uDzoBQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:53.543345 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:44050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUlbysWC90G-1nBrA98AAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:56.994604 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:42806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUmAlT9VtDQc7bgUynXwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:04.703382 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:56008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUoHjZBu2q05ozVU9PDgAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:07.304753 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:56024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUo3bQATo66fKoS7xGgQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:12.829650 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:37970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUqHjZBu2q05ozVU9PFwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:16.223017 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:37976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUrHjZBu2q05ozVU9PGwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:31.415277 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:37992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUu3bQATo66fKoS7xGowAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:37.065154 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:40792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUwY6lpbStxTqkSktlxgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:47.065844 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:49506] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgUy46lpbStxTqkSktlyQAAAlI"]
[Mon Mar 16 11:33:51.385572 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUz7ysWC90G-1nBrA-HQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:52.683693 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:58332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU0Jqj1wV0Si-OkefkmwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:07.007808 2026] [access_compat:error] [pid 10831:tid 140411582465792] [client 185.177.72.22:50268] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 11:34:13.887311 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:58346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU5f9ocpUE4ed4uDzoJgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:21.591379 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:60794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU7RXjF1vJNtV6CWrwIwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:24.728098 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:46406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU8AlT9VtDQc7bgUyncQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:29.110981 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:46412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU9bABkC4fWIHEf8Hj7wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:43.321882 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:59312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVA7ysWC90G-1nBrA-OAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:44.639553 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:43930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVBNSswJuvopo3lOhYSQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:05.163667 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:43942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVGbysWC90G-1nBrA-TwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:06.447475 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:59224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVGhXjF1vJNtV6CWrwLgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:35:10.982910 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:59232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVHtSswJuvopo3lOhYUQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:24.242702 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:50804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVLP9ocpUE4ed4uDzoRQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:35:25.566907 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:35504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVLXjZBu2q05ozVU9PRAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:33.291437 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:35508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVNXbQATo66fKoS7xHDAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:39.999744 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:49074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVOxXjF1vJNtV6CWrwRQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:47.195300 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:39904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVQ_9ocpUE4ed4uDzoUgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:09.365111 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:48330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVWY6lpbStxTqkSktmAwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:17.943249 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:59704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVYbysWC90G-1nBrA-cwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:36:19.263181 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVY46lpbStxTqkSktmCAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:19.362580 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:42044] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgVY46lpbStxTqkSktmCQAAAlQ"]
[Mon Mar 16 11:36:20.432070 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:42852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVZNSswJuvopo3lOhYawAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:23.827542 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:42866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVZwlT9VtDQc7bgUynlQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:25.084089 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:42876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVadSswJuvopo3lOhYbAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:27.447086 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:42878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVa3jZBu2q05ozVU9PWwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:36:35.294108 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:37952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVc7ysWC90G-1nBrA-fgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:47.181245 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:37962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVf_9ocpUE4ed4uDzocwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:58.649871 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:52362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgViglT9VtDQc7bgUynqQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:10.846980 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:42556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVlv9ocpUE4ed4uDzogwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:12.220953 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:50914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVmHjZBu2q05ozVU9PcgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:16.662173 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVnNSswJuvopo3lOhYgAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:20.097672 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:50938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVoHjZBu2q05ozVU9PdgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:21.467267 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:52188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVoXbQATo66fKoS7xHNQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:29.944987 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:52192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVqRXjF1vJNtV6CWrwqwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:36.610434 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:45580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVsJqj1wV0Si-OkefljQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:37.966788 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:45584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVsdSswJuvopo3lOhYiQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:42.579863 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:46878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVtrysWC90G-1nBrA-lwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:38:36.243112 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 185.177.72.22:55704] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 11:38:43.022248 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:46890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgV8wlT9VtDQc7bgUyoMAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:38:48.300203 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.244.31:37942] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgV-BXjF1vJNtV6CWrwyAAAAdg"]
[Mon Mar 16 11:39:06.962950 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:41818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWCo6lpbStxTqkSktmUAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:09.322929 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:49244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWDXjZBu2q05ozVU9PwQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:17.772708 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWFQlT9VtDQc7bgUyoOQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:19.519779 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:52204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWF3bQATo66fKoS7xHXAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:22.255634 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:52216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWGhXjF1vJNtV6CWrw1AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:38.864596 2026] [access_compat:error] [pid 10709:tid 140411632822016] [client 185.177.72.22:57090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 11:39:54.329598 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:52218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWOpqj1wV0Si-Okefl3gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:40:22.878813 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:46948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWVnjZBu2q05ozVU9QGAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:40:24.241079 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:40162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWWAlT9VtDQc7bgUyoXAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:41:09.929545 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWhXjZBu2q05ozVU9QXgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:41:20.169832 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:34870] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgWkJqj1wV0Si-OkefmMwAAAA4"]
[Mon Mar 16 11:41:20.894982 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:59904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWkNSswJuvopo3lOhYyQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:42:08.615759 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:46414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWwLysWC90G-1nBrA_AgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:42:11.043513 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:33594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWw46lpbStxTqkSktmkQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:42:45.664145 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:33604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgW5RXjF1vJNtV6CWrxHAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:45:33.348486 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:49198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgXjBXjF1vJNtV6CWrxcwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:46:21.146048 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.228.16:55982] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgXvf9ocpUE4ed4uDzpOgAAAgo"]
[Mon Mar 16 11:47:43.315164 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:34124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgYD3jZBu2q05ozVU9RxwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:48:49.958197 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.244.31:46388] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgYUI6lpbStxTqkSktnUQAAAkE"]
[Mon Mar 16 11:49:55.939906 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:45246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgYkwlT9VtDQc7bgUyqEgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 11:51:21.890943 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.228.16:44500] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgY6f9ocpUE4ed4uDzpkAAAAhU"]
[Mon Mar 16 11:53:49.563225 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:45444] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgZfdSswJuvopo3lOhZYAAAAIw"]
[Mon Mar 16 11:56:25.010811 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:44754] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgaGZqj1wV0Si-OkefoCQAAAAU"]
[Mon Mar 16 11:56:45.786873 2026] [mime_magic:error] [pid 21806:tid 140411590858496] (70014)End of file found: [client 74.7.243.203:57806] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root
[Mon Mar 16 11:58:34.789237 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:42496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgamrABkC4fWIHEf8HmpQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:58:49.441142 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:43842] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgaqXbQATo66fKoS7xKoAAAAMM"]
[Mon Mar 16 12:01:25.619167 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:39778] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgbRXjZBu2q05ozVU9TbgAAAVM"]
[Mon Mar 16 12:02:08.682856 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:45054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbcAlT9VtDQc7bgUysOAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:10.010264 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:36266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbcrABkC4fWIHEf8HnJQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:11.228172 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbc9SswJuvopo3lOhaWAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:12.428311 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:34532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbdHjZBu2q05ozVU9ThQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:13.602632 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:34538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbddSswJuvopo3lOhaWgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:15.975159 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbd5qj1wV0Si-OkefpBQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:17.501014 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:34560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbeXjZBu2q05ozVU9TiAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:18.808160 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:34562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbetSswJuvopo3lOhaXQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:19.995803 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:34566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbewlT9VtDQc7bgUysOwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:22.359874 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:59908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbfhXjF1vJNtV6CWry5wAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:24.743133 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:59922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbf_9ocpUE4ed4uDzqSwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:26.090904 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:59926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbgv9ocpUE4ed4uDzqTgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:27.243532 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:59932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbgwlT9VtDQc7bgUysPgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:28.630339 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:59946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbhJqj1wV0Si-OkefpEAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:29.851179 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:59948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbhQlT9VtDQc7bgUysQQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:33.303343 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:41786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbif9ocpUE4ed4uDzqUQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:34.582052 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:41802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbinbQATo66fKoS7xLEwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:35.731119 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbi9SswJuvopo3lOhaXwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:37.026559 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:41824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbjbABkC4fWIHEf8HnPgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:39.475191 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:41832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbj7ysWC90G-1nBrBBvwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:41.000037 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:45484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbkBXjF1vJNtV6CWry7wAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:42.659062 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:45492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbkrysWC90G-1nBrBBwwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:44.139642 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:45498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblJqj1wV0Si-OkefpGgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:45.411758 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:45502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblZqj1wV0Si-OkefpGwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:46.775016 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblrABkC4fWIHEf8HnQAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:48.104999 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:45522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmLABkC4fWIHEf8HnQgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:49.292221 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:45528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmf9ocpUE4ed4uDzqXAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:50.670447 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:47996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmtSswJuvopo3lOhaYgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:51.967038 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:48006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbm46lpbStxTqkSkto0AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:55.519543 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:48014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbn5qj1wV0Si-OkefpHgAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:56.803264 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:48020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgboLysWC90G-1nBrBByQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:58.181097 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:48028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgborysWC90G-1nBrBBygAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:03.215830 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:48044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbp5qj1wV0Si-OkefpJAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:04.627055 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:43708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqNSswJuvopo3lOhaZgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:05.931396 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:43720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqbysWC90G-1nBrBBzAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:07.097505 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:43732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqxXjF1vJNtV6CWry9gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:09.465151 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:43744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbrdSswJuvopo3lOhaawAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:10.823885 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:33756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbrnbQATo66fKoS7xLIQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:12.153604 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:33760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbsLABkC4fWIHEf8HnSwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:26.299536 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:33776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbvtSswJuvopo3lOhaewAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:03:28.628266 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbwBXjF1vJNtV6CWry-QAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:03:31.151457 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:33820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbw7ysWC90G-1nBrBBzwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:51.071199 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.244.31:52386] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgb146lpbStxTqkSktpDAAAAk4"]
[Mon Mar 16 12:03:51.696304 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:39904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb17ysWC90G-1nBrBB4gAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:53.018313 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:37582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb2Y6lpbStxTqkSktpDwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:56.304954 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:37588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb3LysWC90G-1nBrBB5QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:00.987579 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:37602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb4HbQATo66fKoS7xLLAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:02.281444 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:52534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb4pqj1wV0Si-OkefpLAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:03.556969 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:52536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb45qj1wV0Si-OkefpLQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:04.907098 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:52538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb5Jqj1wV0Si-OkefpLwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:06.071082 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb5o6lpbStxTqkSktpJwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:07.434956 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:52566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb57ABkC4fWIHEf8HnTwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:08.601820 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:52572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb6HbQATo66fKoS7xLLQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:11.163502 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb6xXjF1vJNtV6CWrzAAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:18.153122 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:35760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb8glT9VtDQc7bgUysYQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:38.632104 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:35766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcBv9ocpUE4ed4uDzq0wAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:49.855604 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:41008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcEbABkC4fWIHEf8HnYQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:00.390707 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:38110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcHLysWC90G-1nBrBCAgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:03.793278 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:39808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcH7ysWC90G-1nBrBCCAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:07.253403 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:39824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcIwlT9VtDQc7bgUysbQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:19.267590 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:39830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcLxXjF1vJNtV6CWrzDwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:23.855138 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:44274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcMwlT9VtDQc7bgUyseAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:27.189179 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:44278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcN3bQATo66fKoS7xLaQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:32.982801 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:44290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcPLABkC4fWIHEf8HnZwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:35.346149 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:45266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcPwlT9VtDQc7bgUysfQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:36.642166 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:45278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcQI6lpbStxTqkSktpQAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:26.912275 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:54128] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgccrABkC4fWIHEf8HnbAAAAE4"]
[Mon Mar 16 12:06:30.775026 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:45288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcdnbQATo66fKoS7xLzQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:42.283574 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:41830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcgnbQATo66fKoS7xL2AAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:48.218628 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:55524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgciJqj1wV0Si-OkefpSgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:49.657007 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:55526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgciQlT9VtDQc7bgUyshwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:51.998344 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:38602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgci9SswJuvopo3lOhapQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:53.359199 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:38612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcjXjZBu2q05ozVU9TrwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:54.685925 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:38616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcjnbQATo66fKoS7xL2wAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:58.032828 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:38628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgckrABkC4fWIHEf8HncAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:02.523006 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:38642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgclv9ocpUE4ed4uDzq-QAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:04.940297 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:35816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcmP9ocpUE4ed4uDzq_AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:06.227299 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:35828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcmpqj1wV0Si-OkefpSwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:07.416378 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcm7ABkC4fWIHEf8HndQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:12.145826 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:35852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcoAlT9VtDQc7bgUysjQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:14.439061 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:45336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcopqj1wV0Si-OkefpUQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:15.758971 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:45348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcowlT9VtDQc7bgUysjgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:16.919961 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:45352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpJqj1wV0Si-OkefpUwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:18.249097 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:45356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpglT9VtDQc7bgUyskAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:19.434979 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:45360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpwlT9VtDQc7bgUyskgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:22.797956 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:46292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcqo6lpbStxTqkSktpVAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:30.611985 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:46308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcsrABkC4fWIHEf8HngAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:31.935704 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:51702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcsxXjF1vJNtV6CWrzJAAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:37.352960 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:51718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcuY6lpbStxTqkSktpYAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:39.963196 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:51732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcu9SswJuvopo3lOha1gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:41.290623 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:41964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcvXjZBu2q05ozVU9T3gAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:47.980597 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:41976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcwwlT9VtDQc7bgUysowAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:49.239977 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcxbysWC90G-1nBrBCagAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:51.863983 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:58814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcx3bQATo66fKoS7xL5QAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:12.343841 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:58824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc23jZBu2q05ozVU9UDAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:16.626120 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:47494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc4HjZBu2q05ozVU9UEwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:24.743206 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:47506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc6AlT9VtDQc7bgUysqwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:26.089823 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:37806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc6rABkC4fWIHEf8HngQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:28.275114 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:37816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7HbQATo66fKoS7xL6gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:29.554945 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7bABkC4fWIHEf8HnggAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:30.835123 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:33466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7rysWC90G-1nBrBCbwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:32.955710 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:33474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc8BXjF1vJNtV6CWrzMAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:37.457095 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:33486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc9Y6lpbStxTqkSktpaQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:38.747443 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:33492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc9nbQATo66fKoS7xL7AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:40.215366 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:37588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc-Jqj1wV0Si-OkefpZgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:44.429949 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:37602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc_BXjF1vJNtV6CWrzMwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:48.056141 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:37606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdAI6lpbStxTqkSktpbgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:49.433360 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:37612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdAQlT9VtDQc7bgUysrwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:50.682526 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:40000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdArysWC90G-1nBrBCdAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:53.282947 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:48114] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgdBdSswJuvopo3lOha_wAAAJM"]
[Mon Mar 16 12:08:59.695791 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:40008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdC9SswJuvopo3lOhbBAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:03.137661 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:43724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdD_9ocpUE4ed4uDzrCwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:08.635903 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:43726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdFJqj1wV0Si-OkefpkAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:24.528802 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:43734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdJLysWC90G-1nBrBCgwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:25.820181 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:59454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdJRXjF1vJNtV6CWrzOAAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:28.080273 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdKNSswJuvopo3lOhbBwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:29.357814 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:59478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdKXjZBu2q05ozVU9USgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:36.999104 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:54510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdMNSswJuvopo3lOhbEQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:38.303608 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:54514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdMpqj1wV0Si-OkefprQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:39.582530 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:54524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdM_9ocpUE4ed4uDzrEgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:40.799288 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:44578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdNHjZBu2q05ozVU9UTAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:43.111990 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:44580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdN7ysWC90G-1nBrBChgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:47.554895 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.243.203:44592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdOxXjF1vJNtV6CWrzPgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:53.012507 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQXbQATo66fKoS7xMAAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:53.380612 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 193.24.211.48:45312] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:09:54.272954 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:52874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQnbQATo66fKoS7xMAQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:55.426469 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:52878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQ5qj1wV0Si-OkefpwAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:56.686499 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:52882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdRHjZBu2q05ozVU9UTgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:01.003320 2026] [access_compat:error] [pid 32654:tid 140411733534464] [client 193.24.211.48:45326] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:01.092828 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:52890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdSbABkC4fWIHEf8HnjgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:05.707310 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:47562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdTRXjF1vJNtV6CWrzQQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:08.054536 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:47578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdUAlT9VtDQc7bgUys-QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:09.607859 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 104.207.40.64:14159] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:10.495093 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:47584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdUo6lpbStxTqkSktpdAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:18.462542 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:55530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdWrABkC4fWIHEf8HnlgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:20.795117 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdXJqj1wV0Si-Okefp2gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:24.822165 2026] [access_compat:error] [pid 10772:tid 140411683178240] [client 104.207.62.33:36827] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:27.364109 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 216.26.250.153:28729] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:30.703234 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:60544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdZo6lpbStxTqkSktpfQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:39.416857 2026] [access_compat:error] [pid 10709:tid 140411540502272] [client 65.111.1.57:62685] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:42.682279 2026] [access_compat:error] [pid 21946:tid 140411683178240] [client 209.50.166.6:59485] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:49.254068 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 209.50.186.27:21809] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:56.059513 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 104.207.35.143:28901] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:11:08.842823 2026] [access_compat:error] [pid 21805:tid 140411557287680] [client 104.207.59.113:18535] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:13:54.382773 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.244.31:44626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgeMv9ocpUE4ed4uDzrnwAAAgY"]
[Mon Mar 16 12:16:10.419070 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:45260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeunjZBu2q05ozVU9VLQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:17.643301 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:37742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgewZqj1wV0Si-OkefqMAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:18.908501 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:37750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgewpqj1wV0Si-OkefqMwAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:20.227007 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:39472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexP9ocpUE4ed4uDzrsQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:21.409388 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:39474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexZqj1wV0Si-OkefqOAAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:22.600963 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:39478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexv9ocpUE4ed4uDzrswAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:23.755794 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:39492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexxXjF1vJNtV6CWrzcQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:26.238203 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:39508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeyrABkC4fWIHEf8HoHgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:27.506055 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:39520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeywlT9VtDQc7bgUyt-gAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:30.952776 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:39524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgezpqj1wV0Si-OkefqQwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:32.261894 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:34204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge0Jqj1wV0Si-OkefqRwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:33.433855 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:34210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge0Zqj1wV0Si-OkefqSgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:35.843559 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge05qj1wV0Si-OkefqTwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:37.135098 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:34238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge1bysWC90G-1nBrBCvwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:38.467227 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:34250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge1pqj1wV0Si-OkefqUgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:39.768775 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:34262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge13bQATo66fKoS7xMnwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:41.087657 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:33480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge2f9ocpUE4ed4uDzrtQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:42.454047 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:33482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge2tSswJuvopo3lOhbpQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:02.599264 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:33490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge7nbQATo66fKoS7xMsgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:05.146041 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:42192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge8f9ocpUE4ed4uDzruAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:06.441234 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:42204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge8njZBu2q05ozVU9VMwAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:07.734092 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:42212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge83jZBu2q05ozVU9VNQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:09.064630 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:42228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge9f9ocpUE4ed4uDzrugAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:11.443636 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:32980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge99SswJuvopo3lOhbqgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:12.775591 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:32992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge-I6lpbStxTqkSktqDgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:15.215088 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:32996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge-wlT9VtDQc7bgUyuKgAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:16.456781 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:32998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge_BXjF1vJNtV6CWrzegAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:19.883875 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:33008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge_wlT9VtDQc7bgUyuOAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:24.783355 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:48318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfBAlT9VtDQc7bgUyuQwAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:35.335750 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:48330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfD9SswJuvopo3lOhbtwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:17:38.902323 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:33286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfEnjZBu2q05ozVU9VPgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:19:14.442889 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:38460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfcrABkC4fWIHEf8HojQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:27.263054 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:34306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgff5qj1wV0Si-OkefqywAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:37.685281 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:45188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfibABkC4fWIHEf8HolQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:56.831378 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:54214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfnAlT9VtDQc7bgUyujgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:25.958345 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:55224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfuRXjF1vJNtV6CWrzsgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:27.504601 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:54334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfu5qj1wV0Si-Okefq1QAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:35.925472 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:54336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfw3bQATo66fKoS7xNNgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:21:27.867144 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:56850] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgf93bQATo66fKoS7xNPAAAAMU"]
[Mon Mar 16 12:22:18.091447 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:44924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggKnjZBu2q05ozVU9VwwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:22:22.963356 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:35240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggLnjZBu2q05ozVU9VyAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:22:29.700199 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:57034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggNQlT9VtDQc7bgUyuqAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:23:03.695865 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:48326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggVwlT9VtDQc7bgUyuywAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:09.199243 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:60620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggXXjZBu2q05ozVU9V1QAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:11.856246 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggXpqj1wV0Si-OkefrYgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:13.194265 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:37280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggYQlT9VtDQc7bgUyuzgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:14.578269 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:37294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggYnbQATo66fKoS7xNTgAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:15.963707 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:37308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggY3jZBu2q05ozVU9V1gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:17.307733 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:37312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggZf9ocpUE4ed4uDzsTgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:18.476310 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:37320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggZhXjF1vJNtV6CWrzyAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:20.852379 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:37334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggaLABkC4fWIHEf8HoqQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:22.150246 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:34298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggav9ocpUE4ed4uDzsTwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:23.477793 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:34314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgga_9ocpUE4ed4uDzsUQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:25.899505 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:34320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggbf9ocpUE4ed4uDzsVAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:27.169044 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:34330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggb3jZBu2q05ozVU9V1wAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:28.407247 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:34346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggcJqj1wV0Si-OkefrhAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:29.606006 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:34352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggcf9ocpUE4ed4uDzsVwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:30.783511 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:37436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggchXjF1vJNtV6CWrzywAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:32.070962 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:37438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdP9ocpUE4ed4uDzsWQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:33.411518 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:37440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdf9ocpUE4ed4uDzsWwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:34.727077 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdhXjF1vJNtV6CWrzzQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:35.993428 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:37462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggd9SswJuvopo3lOhb3QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:37.318640 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:37476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggedSswJuvopo3lOhb3gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:38.515229 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:37482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggeo6lpbStxTqkSktqQgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:39.953342 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:37494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggewlT9VtDQc7bgUyu0gAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:41.463579 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:35568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggfQlT9VtDQc7bgUyu0wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:42.803881 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:35574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggfpqj1wV0Si-OkefrogAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:44.009359 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:35588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgggAlT9VtDQc7bgUyu1AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:45.323483 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:35594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgggdSswJuvopo3lOhb4AAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:46.689151 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:35604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggghXjF1vJNtV6CWrz0AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:47.975931 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggg3jZBu2q05ozVU9V2wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:49.279701 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:35624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgghbABkC4fWIHEf8HorwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:50.602833 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggho6lpbStxTqkSktqRQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:51.994919 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:43148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggh46lpbStxTqkSktqRgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:53.371328 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:43156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggif9ocpUE4ed4uDzsXwAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:54.747500 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:43162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggirABkC4fWIHEf8HosgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:56.059365 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:43170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggjNSswJuvopo3lOhb4gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:56.093249 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:33276] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abggjLABkC4fWIHEf8HotAAAAE4"]
[Mon Mar 16 12:23:57.408678 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:43180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggjbABkC4fWIHEf8HotQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:59.734342 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggj46lpbStxTqkSktqSwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:01.080093 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:42132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggkQlT9VtDQc7bgUyu1gAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:02.365127 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:42140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggknbQATo66fKoS7xNVgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:03.547083 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:42156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggkwlT9VtDQc7bgUyu2AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:04.821084 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:42162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgglNSswJuvopo3lOhb4wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:06.135945 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.243.203:42178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgglglT9VtDQc7bgUyu2QAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:07.328634 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:42188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggl_9ocpUE4ed4uDzsYAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:08.624459 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:42192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggmAlT9VtDQc7bgUyu2gAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:09.765155 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:42194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggmQlT9VtDQc7bgUyu3AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:11.131773 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:48572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggm_9ocpUE4ed4uDzsYQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:12.319489 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:48580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggnJqj1wV0Si-OkefrxwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:14.038138 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:48582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggnZqj1wV0Si-OkefryAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:15.324198 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:48590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggn9SswJuvopo3lOhb5AAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:16.668752 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:48592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggoBXjF1vJNtV6CWrz1AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:17.981296 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:48596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggoXbQATo66fKoS7xNWQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:19.326018 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:48610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggo7ABkC4fWIHEf8HotgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:20.621571 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:44864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggpJqj1wV0Si-OkefrzwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:21.867092 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:44874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggpY6lpbStxTqkSktqYQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:23.005639 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:44880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggp3jZBu2q05ozVU9V3wAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:24.275577 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:44892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggqAlT9VtDQc7bgUyu4AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:26.421041 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:44896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggqQlT9VtDQc7bgUyu4QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:27.789471 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:44902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggq46lpbStxTqkSktqaAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:28.892905 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:44912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggrHjZBu2q05ozVU9V4AAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:30.078894 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:50588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggrnbQATo66fKoS7xNXAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:31.872386 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:50598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggr3jZBu2q05ozVU9V4QAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:33.243143 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:50610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggsRXjF1vJNtV6CWrz1gAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:34.607408 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggshXjF1vJNtV6CWrz1wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:35.898624 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:50630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggswlT9VtDQc7bgUyu4wAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:37.230830 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:50634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggtf9ocpUE4ed4uDzsZQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:38.584355 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:50638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggto6lpbStxTqkSktqdAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:39.887276 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:50640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggtxXjF1vJNtV6CWrz2QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:41.219192 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:52486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgguXbQATo66fKoS7xNYAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:42.514239 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:52490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgguhXjF1vJNtV6CWrz2wAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:46.036626 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:52502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggvP9ocpUE4ed4uDzsaAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:48.482505 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:52508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggv3jZBu2q05ozVU9V4wAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:49.818183 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:52518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwXjZBu2q05ozVU9V5QAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:51.187290 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwwlT9VtDQc7bgUyu5wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:51.415046 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwwlT9VtDQc7bgUyu6AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:26:33.804570 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.228.16:32794] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abghKRXjF1vJNtV6CWrz6AAAAc0"]
[Mon Mar 16 12:26:56.783339 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:49418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abghQNSswJuvopo3lOhcLAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:28:15.007868 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:49812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abghj3bQATo66fKoS7xNuwAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:28:56.352799 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.244.31:34810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abghuBXjF1vJNtV6CWr0EgAAAcQ"]
[Mon Mar 16 12:30:38.086827 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:33148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiHnjZBu2q05ozVU9WeAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:31:34.594944 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.228.16:38762] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgiVpqj1wV0Si-OkefsewAAABI"]
[Mon Mar 16 12:31:51.682863 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:58258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiZNSswJuvopo3lOhc_AAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:32:26.661101 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiio6lpbStxTqkSktrBwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:32:39.398552 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:51030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgil7ysWC90G-1nBrBEFAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:40.783433 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:39524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgimNSswJuvopo3lOhdPgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:42.421063 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:39530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgimv9ocpUE4ed4uDzt3wAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:43.829448 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:39532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgim3jZBu2q05ozVU9WugAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:49.353319 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:39538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abginrysWC90G-1nBrBEFgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:00.831590 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:45868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgirJqj1wV0Si-OkefsmAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:03.355677 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:57098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgir3bQATo66fKoS7xN6QAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:07.014630 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:57112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgis7ysWC90G-1nBrBEHAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:08.370679 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:57128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgitLABkC4fWIHEf8HpBwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:12.443253 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:57130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiuHjZBu2q05ozVU9WwQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:13.791351 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:38592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiuQlT9VtDQc7bgUyvxQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:15.124097 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:38608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiu3bQATo66fKoS7xN7gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:16.436448 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:38624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgivBXjF1vJNtV6CWr0eQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:17.744083 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:38638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgivbABkC4fWIHEf8HpCAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:20.120668 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:38648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiwHbQATo66fKoS7xN8AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:21.408194 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:49888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiwY6lpbStxTqkSktrIgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:27.880003 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgix46lpbStxTqkSktrKAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:29.235214 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:49896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiyRXjF1vJNtV6CWr0ewAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:30.547123 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:33234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiyrABkC4fWIHEf8HpCQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:31.852841 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:33236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiy3jZBu2q05ozVU9WxQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:35.290341 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:33246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgizxXjF1vJNtV6CWr0fwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:37.606173 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:33250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi0QlT9VtDQc7bgUyv3wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:38.903082 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:33258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi0hXjF1vJNtV6CWr0gAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:40.222416 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:33458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1BXjF1vJNtV6CWr0gQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:42.670202 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:33470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1nbQATo66fKoS7xN8wAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:43.985400 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:33472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1xXjF1vJNtV6CWr0ggAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:45.167304 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:33476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi2XbQATo66fKoS7xN9AAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:48.780069 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:33482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi3LABkC4fWIHEf8HpDQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:50.197820 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:41942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi3glT9VtDQc7bgUyv7wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:52.676389 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi4AlT9VtDQc7bgUyv9AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:53.979037 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:41972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi4XbQATo66fKoS7xN-AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:57.398911 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:41978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi5RXjF1vJNtV6CWr0iwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:57.770754 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:49314] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgi5XbQATo66fKoS7xN-QAAAMs"]
[Mon Mar 16 12:33:59.838079 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:41982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi53jZBu2q05ozVU9WywAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:01.194561 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:58934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi6Zqj1wV0Si-OkefspQAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:02.521467 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:58942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi6pqj1wV0Si-OkefspgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:03.731666 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:58952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi67ysWC90G-1nBrBEIgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:05.075260 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:58958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi7Y6lpbStxTqkSktrMAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:06.249274 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:58966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi7rABkC4fWIHEf8HpFAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:08.775161 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:58970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi8AlT9VtDQc7bgUywCAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:13.515046 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:58980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi9Y6lpbStxTqkSktrNgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:14.735043 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:36650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi9o6lpbStxTqkSktrNwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:17.171056 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:36664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi-dSswJuvopo3lOhdaQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:19.642596 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi-9SswJuvopo3lOhdbQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:01.046458 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:47000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJRXjF1vJNtV6CWr0uAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:02.695797 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:41948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJo6lpbStxTqkSktrQgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:03.854596 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJ46lpbStxTqkSktrQwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:39.170499 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:41964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjS3bQATo66fKoS7xOJwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:42.483046 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:49778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjTnbQATo66fKoS7xOKgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:44.926640 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:49782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjULysWC90G-1nBrBEOgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:52.291495 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:47652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjWLABkC4fWIHEf8HpcAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:54.900671 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:46224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjWRXjF1vJNtV6CWr0xQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:55.955619 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:49792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjW_9ocpUE4ed4uDzuWwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:57.228242 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:35894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjXXjZBu2q05ozVU9W6gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:00.411044 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:46226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjYHjZBu2q05ozVU9W8AAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:01.683238 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:44712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjYbABkC4fWIHEf8HpcgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:05.262397 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:44718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjZXjZBu2q05ozVU9W9wAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:06.554770 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:44734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjZglT9VtDQc7bgUywNAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:08.847011 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:44746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjaP9ocpUE4ed4uDzuYgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:10.161541 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:48000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjahXjF1vJNtV6CWr0ygAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:11.386639 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:48012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgja46lpbStxTqkSktrUwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:12.686332 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:48024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjbHjZBu2q05ozVU9W_wAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:13.847853 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:48026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjbXjZBu2q05ozVU9XAQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:15.162071 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:48028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjb7ABkC4fWIHEf8HpdQAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:15.521091 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:35906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjb3jZBu2q05ozVU9XAwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:17.506822 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:48040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjcZqj1wV0Si-OkefsxgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:18.764519 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:50992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjcnbQATo66fKoS7xOLgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:19.903334 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:50998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjc_9ocpUE4ed4uDzuZwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:21.214757 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:51010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjdRXjF1vJNtV6CWr0zgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:22.370359 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:51012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjdrysWC90G-1nBrBEQQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:23.567571 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:51026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjd3bQATo66fKoS7xOMQAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:24.834930 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:51042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjeHjZBu2q05ozVU9XBwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:25.992772 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:51056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjebABkC4fWIHEf8HpdwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:28.477528 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:51072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgje46lpbStxTqkSktrVwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:29.828386 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:60932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjfXbQATo66fKoS7xONgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:31.903105 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:60938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjf9SswJuvopo3lOhdkQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:33.196940 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:60952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgbABkC4fWIHEf8HpewAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:34.595052 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:60968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgo6lpbStxTqkSktrWQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:35.930819 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.241.46:60976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgxXjF1vJNtV6CWr00wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:37.245804 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:60986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjhRXjF1vJNtV6CWr01AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:38.563567 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:57276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjhpqj1wV0Si-OkefsygAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:39.858666 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.228.16:37040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgjh_9ocpUE4ed4uDzuagAAAgQ"]
[Mon Mar 16 12:36:39.867941 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:57280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjh9SswJuvopo3lOhdmQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:42.084905 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:57296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjirysWC90G-1nBrBERwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:44.418372 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:57300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjjP9ocpUE4ed4uDzubgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:46.845823 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:57314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjjbABkC4fWIHEf8HpfQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:48.239380 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:35084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkHjZBu2q05ozVU9XCwAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:49.002349 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:53466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkdSswJuvopo3lOhdoQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:49.394530 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:35094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkXjZBu2q05ozVU9XDAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:50.702901 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:35100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkpqj1wV0Si-OkefszwAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:51.331156 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjk5qj1wV0Si-Okefs0AAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:51.859195 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:35108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjk46lpbStxTqkSktrXQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:52.637326 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:55588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlI6lpbStxTqkSktrXgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:53.136158 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:35112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlZqj1wV0Si-Okefs0QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:55.063151 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:55604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlxXjF1vJNtV6CWr02QAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:55.379555 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:35122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjl5qj1wV0Si-Okefs1AAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:56.699236 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:35134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjmLABkC4fWIHEf8HpgQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:01.178931 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:35144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjnXbQATo66fKoS7xORAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:03.997984 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:54072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjnnbQATo66fKoS7xORwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:05.330960 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:54080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjoRXjF1vJNtV6CWr02gAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:06.557526 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:54094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjorysWC90G-1nBrBESwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:07.733886 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjo46lpbStxTqkSktrYQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:08.943773 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:36588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjpI6lpbStxTqkSktrYwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:09.350608 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:55612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjpQlT9VtDQc7bgUywfgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:10.088021 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:36590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjprABkC4fWIHEf8HphAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:15.661801 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:36606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjq7ysWC90G-1nBrBEUQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:20.292051 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:36614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjsAlT9VtDQc7bgUywjQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:21.583334 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:45318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjsf9ocpUE4ed4uDzudgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:25.260755 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:45326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjtNSswJuvopo3lOhdqAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:26.616262 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:45334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjtrysWC90G-1nBrBEVAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:31.844984 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:45344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgju7ABkC4fWIHEf8HpjAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:35.107900 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:57244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjv_9ocpUE4ed4uDzuewAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:36.405683 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:57252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwNSswJuvopo3lOhdqgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:37.539052 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:57256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwXbQATo66fKoS7xOTQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:38.862381 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:42366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwrysWC90G-1nBrBEWAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:40.039628 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:42370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjxI6lpbStxTqkSktrbAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:42.197164 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:42372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjxo6lpbStxTqkSktrbgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:47.718323 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:45170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjy5qj1wV0Si-Okefs_wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:53.591389 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:42388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj0Zqj1wV0Si-OkeftBgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:54.922310 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:34248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj0o6lpbStxTqkSktrcwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:58.435401 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:34252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj1rABkC4fWIHEf8HpkQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:04.412573 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:38980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj3LysWC90G-1nBrBEXwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:06.819447 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:38986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj3nbQATo66fKoS7xOUgAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:08.087407 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:38994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj4LABkC4fWIHEf8HplgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:11.299910 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:51400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj4xXjF1vJNtV6CWr05wAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:15.674695 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:51404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj5_9ocpUE4ed4uDzuigAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:16.938391 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:51414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj6BXjF1vJNtV6CWr06gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:20.299425 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:47678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj7P9ocpUE4ed4uDzujgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:21.591136 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:47686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj7RXjF1vJNtV6CWr07QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:24.692246 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj8LABkC4fWIHEf8HpmwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:25.997055 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:47704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj8Zqj1wV0Si-OkeftNAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:28.243460 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:47710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj9P9ocpUE4ed4uDzukQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:29.532706 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj9f9ocpUE4ed4uDzukgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:32.913758 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:47712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj-AlT9VtDQc7bgUywuAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:37.507621 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:47726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_QlT9VtDQc7bgUywvgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:38.564576 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:42494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_tSswJuvopo3lOhd8QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:38.846959 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:50068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_rABkC4fWIHEf8HpnwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:39.871679 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj__9ocpUE4ed4uDzulgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:40.138956 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:50084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAHjZBu2q05ozVU9XMQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:41.137034 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:39650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAXbQATo66fKoS7xOWgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:42.537420 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:50086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAhXjF1vJNtV6CWr1AAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:44.958642 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:50102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkBHjZBu2q05ozVU9XNwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:47.009191 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:39660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkB3bQATo66fKoS7xOXgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:47.379571 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:50108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkB7ABkC4fWIHEf8HpogAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:50.759649 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:48528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkCv9ocpUE4ed4uDzunwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:52.955648 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:39664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkDP9ocpUE4ed4uDzuogAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:55.228816 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:43062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkD7ysWC90G-1nBrBEcwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:57.956099 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.244.31:59588] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgkEQlT9VtDQc7bgUywwgAAAQk"]
[Mon Mar 16 12:38:59.178781 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:43070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkExXjF1vJNtV6CWr1BwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:00.443436 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:48542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkFHbQATo66fKoS7xOaAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:02.542237 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:47520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkFhXjF1vJNtV6CWr1DQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:08.126713 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:55810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHHjZBu2q05ozVU9XRQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:09.405376 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:53520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHXjZBu2q05ozVU9XRwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:10.115949 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:47524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHhXjF1vJNtV6CWr1FQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:12.303324 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:46108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkH3jZBu2q05ozVU9XSAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:14.647502 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:46118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkIrABkC4fWIHEf8HpswAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:16.571807 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:53534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkJBXjF1vJNtV6CWr1HQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:39:19.973249 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:53546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkJ3bQATo66fKoS7xOawAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:24.221523 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:46130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkLBXjF1vJNtV6CWr1JgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:26.612801 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkLpqj1wV0Si-OkeftbwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:29.979791 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:34626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkMZqj1wV0Si-OkefteAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:32.332517 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:44088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkNJqj1wV0Si-OkeftfAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:37.188354 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:44100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkOZqj1wV0Si-OkeftiAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:46.070098 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:44116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkQnbQATo66fKoS7xOdQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:49.412769 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkRbABkC4fWIHEf8HptwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:51.844447 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:59448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkRxXjF1vJNtV6CWr1KgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:53.183412 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:59452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkSXbQATo66fKoS7xOdwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:04.965024 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkVHjZBu2q05ozVU9XWAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:11.585491 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:55932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkW9SswJuvopo3lOheAwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:19.291705 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:43784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkYxXjF1vJNtV6CWr1MwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:26.123371 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:60802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkao6lpbStxTqkSktrtQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:30.766495 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:60816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkbtSswJuvopo3lOheCAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:37.760655 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:44400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkdRXjF1vJNtV6CWr1PgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:39.126960 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:44410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkd3bQATo66fKoS7xOhgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:43.751617 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:39796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgke7ysWC90G-1nBrBEyQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:40:45.142303 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:48678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkfXjZBu2q05ozVU9XXQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:49.389822 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:37528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkgXbQATo66fKoS7xOlQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:50.665715 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:45760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkgnbQATo66fKoS7xOlgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:51.984458 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:45774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkg46lpbStxTqkSktruwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:57.516253 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:45788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkiZqj1wV0Si-OkeftsgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:03.456074 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:45804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkj_9ocpUE4ed4uDzuvgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:08.161945 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:38820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgklJqj1wV0Si-OkeftuQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:09.465427 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:38836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgklZqj1wV0Si-OkeftuwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:24.272214 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:36608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkpAlT9VtDQc7bgUyxNgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:34.334290 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:55316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkrnbQATo66fKoS7xOzgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:37.755759 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:52244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgksXbQATo66fKoS7xO1gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:39.066208 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgks5qj1wV0Si-OkeftvwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:41.448591 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.228.16:52748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgktRXjF1vJNtV6CWr1SwAAAcw"]
[Mon Mar 16 12:41:47.736441 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:40886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgku5qj1wV0Si-OkeftxwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:06.179597 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:40894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkznbQATo66fKoS7xPBQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:09.648413 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:42062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk0QlT9VtDQc7bgUyxXgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:11.995901 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:55996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk0_9ocpUE4ed4uDzuyAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:15.384294 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:56002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk1_9ocpUE4ed4uDzuzQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:22.755466 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:56004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk3njZBu2q05ozVU9XcQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:25.155424 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:54160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk4RXjF1vJNtV6CWr1YgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:14.283520 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:60910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglEnbQATo66fKoS7xPSwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:17.642933 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:39998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglFf9ocpUE4ed4uDzu2wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:26.881225 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:54164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglHo6lpbStxTqkSktsHAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:39.582867 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:36654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglKxXjF1vJNtV6CWr1sQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:45.304950 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:58684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglMbysWC90G-1nBrBE6QAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:47.736173 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:58698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglM7ABkC4fWIHEf8Hp1gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:50.552977 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:58712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglNv9ocpUE4ed4uDzu4QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:58.280224 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:44320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglPglT9VtDQc7bgUyxeAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:59.576266 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:44332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglP3bQATo66fKoS7xPUwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:44:00.765884 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:51330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglQHbQATo66fKoS7xPVAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:44:03.079122 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:51346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglQ7ABkC4fWIHEf8Hp2gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:10.613646 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:51348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglhrysWC90G-1nBrBFJwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:16.384895 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:39058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgljJqj1wV0Si-Okeft-gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:17.691037 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgljXbQATo66fKoS7xPZgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:28.437327 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:39074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglmLysWC90G-1nBrBFMgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:46:27.902281 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:47584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgl0rABkC4fWIHEf8HqkAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:46:43.570727 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:45932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgl4glT9VtDQc7bgUyxvAAAARg"]
[Mon Mar 16 12:47:31.415099 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:43688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmEwlT9VtDQc7bgUyx-QAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:48:05.068265 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:55218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmNQlT9VtDQc7bgUyyHgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:48:43.689505 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:36214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmW9SswJuvopo3lOhfSgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:49:00.123633 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:41684] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgmbNSswJuvopo3lOhfSwAAAJc"]
[Mon Mar 16 12:49:40.429701 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:39290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmlBXjF1vJNtV6CWr2hQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:12.572650 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:33238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmtLysWC90G-1nBrBFlgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:18.331127 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:47254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmupqj1wV0Si-OkefueQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:18.398871 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:38336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmunbQATo66fKoS7xPxAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:19.627058 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:58488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmu5qj1wV0Si-OkefuewAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:50:21.919917 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:38350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmvQlT9VtDQc7bgUyyTgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:24.326505 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:57322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmwHjZBu2q05ozVU9X6gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:26.682272 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:57328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmwtSswJuvopo3lOhfZAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:27.966730 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:57330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmw9SswJuvopo3lOhfZQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:29.245873 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:57332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxRXjF1vJNtV6CWr2jQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:29.551793 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:58498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxbysWC90G-1nBrBFnwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:30.559617 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:52576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxhXjF1vJNtV6CWr2jgAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:36.819011 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:52582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmzBXjF1vJNtV6CWr2lQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:42.550777 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:52594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm0nbQATo66fKoS7xPzwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:46.490066 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm1o6lpbStxTqkSktszQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:11.235971 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:38648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm73jZBu2q05ozVU9YFgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:51:11.989423 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:52050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm77ysWC90G-1nBrBFuQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:15.707264 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:49218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm83bQATo66fKoS7xP4AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:16.771544 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:34950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9AlT9VtDQc7bgUyyZgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:51:17.068030 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9dSswJuvopo3lOhfcgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:18.394182 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:49236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9tSswJuvopo3lOhfcwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:19.583361 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:49242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm99SswJuvopo3lOhfdgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:24.103946 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:58330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_LABkC4fWIHEf8HrjgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:25.389381 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:58342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_bABkC4fWIHEf8HrkAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:26.658405 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:58344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_njZBu2q05ozVU9YFwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:28.055299 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnAP9ocpUE4ed4uDzvQQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:34.458170 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:58368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnBpqj1wV0Si-OkefumgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:35.765583 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:33682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnB3jZBu2q05ozVU9YGgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:45.994155 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.228.16:37660] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgnEAlT9VtDQc7bgUyybQAAAQM"]
[Mon Mar 16 12:52:01.680801 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnIbABkC4fWIHEf8HrqAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:14.286955 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:45282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnLv9ocpUE4ed4uDzveQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:29.750361 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:33242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnPRXjF1vJNtV6CWr2vwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:32.247945 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:54220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQBXjF1vJNtV6CWr2wgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:33.111532 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:52114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQf9ocpUE4ed4uDzvjgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:52:33.552980 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:54236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQXbQATo66fKoS7xP9AAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:35.979746 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:54240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQ46lpbStxTqkSkts8QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:54.608074 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnVnbQATo66fKoS7xQDAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:52:55.846544 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:54254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnV7ABkC4fWIHEf8HrwAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:58.583439 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:41102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnWo6lpbStxTqkSkts_QAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:52:59.424474 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:48604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnW46lpbStxTqkSkts_wAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:00.735033 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnXAlT9VtDQc7bgUyyewAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:04.178125 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:54036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnYLABkC4fWIHEf8HrwwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:09.027048 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:54040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnZZqj1wV0Si-OkefusAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:12.674963 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:38196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnZhXjF1vJNtV6CWr22AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:33.271890 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:38208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnff9ocpUE4ed4uDzvrgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:34.594704 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:58430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnfhXjF1vJNtV6CWr24QAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:38.508662 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:58436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgngglT9VtDQc7bgUyymwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:40.984286 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:58448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnhHbQATo66fKoS7xQIAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:43.334349 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:41130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnh46lpbStxTqkSkttBwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:44.651402 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:41136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgniHjZBu2q05ozVU9YPAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:45.975929 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:41142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnibysWC90G-1nBrBGOAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:47.309504 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:41154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgni46lpbStxTqkSkttCgAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:48.619330 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:41164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjHjZBu2q05ozVU9YPgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:49.467220 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:38610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjdSswJuvopo3lOhfxAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:53:49.942928 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:41180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjbysWC90G-1nBrBGPAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:51.267094 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:55074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnj3bQATo66fKoS7xQLAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:52.409009 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:55084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnkI6lpbStxTqkSkttDAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:53.840509 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:55094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnkQlT9VtDQc7bgUyyoAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:56.264105 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:55110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnk3jZBu2q05ozVU9YQQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:57.601941 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:55120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnlZqj1wV0Si-OkefuvwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:58.971409 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:55124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnlpqj1wV0Si-OkefuwAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:00.313121 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:46504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmHbQATo66fKoS7xQNwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:00.384170 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:57094] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgnmHbQATo66fKoS7xQOAAAAMk"]
[Mon Mar 16 12:54:01.443957 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:46510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmXjZBu2q05ozVU9YRAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:02.778848 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:46522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmnjZBu2q05ozVU9YRQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:03.943181 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:46532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnm7ABkC4fWIHEf8Hr1wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:05.348475 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:46542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnnbABkC4fWIHEf8Hr2gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:06.699012 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:46552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnnrysWC90G-1nBrBGQgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:08.088914 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:46560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnoNSswJuvopo3lOhfxwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:09.289899 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:46562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnoZqj1wV0Si-OkefuwQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:10.490861 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:58472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnopqj1wV0Si-OkefuwgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:11.685956 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:58478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgno9SswJuvopo3lOhfygAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:13.197471 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:58488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnpLABkC4fWIHEf8Hr5AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:15.650279 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnprysWC90G-1nBrBGQwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:18.545837 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:58518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnqRXjF1vJNtV6CWr27gAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:19.962286 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:58532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnq3jZBu2q05ozVU9YSwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:22.426825 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:48682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnrnjZBu2q05ozVU9YTwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:23.718351 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:48686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnrwlT9VtDQc7bgUyywQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:25.016070 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:48690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnsY6lpbStxTqkSkttEwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:26.264741 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:48704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnsrABkC4fWIHEf8Hr5wAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:27.627025 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:48718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnswlT9VtDQc7bgUyyxwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:28.922867 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:48730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgntNSswJuvopo3lOhfzgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:30.270918 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:56772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnthXjF1vJNtV6CWr29AAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:31.463523 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:56782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnt_9ocpUE4ed4uDzvvQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:32.746413 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:56798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnuLysWC90G-1nBrBGSQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:34.055337 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:56814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnuglT9VtDQc7bgUyyzQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:35.192038 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:56822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnu9SswJuvopo3lOhfzwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:36.476477 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:56836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvHjZBu2q05ozVU9YVQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:37.660349 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:56838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvRXjF1vJNtV6CWr29QAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:38.959928 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:56844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvnbQATo66fKoS7xQWgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:40.241255 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:33340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwHjZBu2q05ozVU9YVwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:41.538071 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwf9ocpUE4ed4uDzvvwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:42.867045 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:33364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwv9ocpUE4ed4uDzvwQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:44.203124 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:33368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnxAlT9VtDQc7bgUyy2QAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:46.461657 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:33376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnxv9ocpUE4ed4uDzvxAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:47.784975 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:33390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnx_9ocpUE4ed4uDzvxQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:49.103162 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnybysWC90G-1nBrBGTQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:50.323390 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:53742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnyhXjF1vJNtV6CWr2-gAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:51.677526 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:53756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgny5qj1wV0Si-Okefu1QAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:52.929832 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:53768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnzBXjF1vJNtV6CWr2_AAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:54.217365 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:53776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnznjZBu2q05ozVU9YWQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:55.583213 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:53778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnz9SswJuvopo3lOhf0wAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:57.747420 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn0Y6lpbStxTqkSkttHwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:59.087256 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:53786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn0wlT9VtDQc7bgUyy6wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:00.339347 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:33536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn1BXjF1vJNtV6CWr2_wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:01.584675 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:33542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn1bABkC4fWIHEf8Hr8gAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:05.436595 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn2RXjF1vJNtV6CWr3CAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:06.971359 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:33564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn2rysWC90G-1nBrBGUAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:55:13.487429 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:33566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn4bABkC4fWIHEf8Hr-QAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:17.123483 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:51796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn5Y6lpbStxTqkSkttKwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:19.610003 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:51798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn5nbQATo66fKoS7xQfwAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:38.840114 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:43970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn-nbQATo66fKoS7xQpwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:47.956456 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:33626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoA7ABkC4fWIHEf8HsBQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:56:12.234673 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:44644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoHNSswJuvopo3lOhf6wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:56:15.884625 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:39496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoH7ysWC90G-1nBrBGZAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:56:51.789642 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.228.16:33010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgoQ5qj1wV0Si-Okefu8AAAAAI"]
[Mon Mar 16 12:56:54.839202 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:39502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoRtSswJuvopo3lOhgFwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:16.535416 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:58354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoXJqj1wV0Si-OkefvCQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:29.850957 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:58270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoaY6lpbStxTqkSkttYgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:46.019435 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:58190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoenjZBu2q05ozVU9Y6gAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:58:12.289489 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:46976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgolP9ocpUE4ed4uDzwGgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:18.263540 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:60850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgomrysWC90G-1nBrBGkQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:41.488294 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:59990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgosQlT9VtDQc7bgUyz6gAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:58:44.578237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:60862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgotJqj1wV0Si-OkefvRAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:46.016965 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:40596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgotrysWC90G-1nBrBGnAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:52.386945 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:53916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgovI6lpbStxTqkSkttgQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:00.679800 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:53436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoxHbQATo66fKoS7xRJAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:03.165658 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:41534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgox46lpbStxTqkSkttkQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:59:03.507421 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:40186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgox9SswJuvopo3lOhgQgAAAJg"]
[Mon Mar 16 12:59:08.863115 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:41536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgozP9ocpUE4ed4uDzwNQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:59:09.846334 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:40608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgozY6lpbStxTqkSkttlwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:17.114012 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:34032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo1QlT9VtDQc7bgUyz-gAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:20.723051 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:34042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo2LABkC4fWIHEf8HsSwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:34.183855 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:54104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo5njZBu2q05ozVU9ZKAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:47.611954 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo8xXjF1vJNtV6CWr3cQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:49.860195 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:46402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo9Zqj1wV0Si-OkefvdAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:51.234913 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:44472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo946lpbStxTqkSkttpAAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:00:00.183945 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:44474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpAP9ocpUE4ed4uDzwTQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:00.727726 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:49384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpAHbQATo66fKoS7xRbQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:07.315408 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:39196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpB46lpbStxTqkSkttsQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:11.952775 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:39212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpC_9ocpUE4ed4uDzwWAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:13.287449 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:53680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpDbABkC4fWIHEf8HsXgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:14.564431 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:53692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpDhXjF1vJNtV6CWr3eQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:16.011442 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:35830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpEHjZBu2q05ozVU9ZSAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:25.747208 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:53702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpGbysWC90G-1nBrBGyAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:27.324614 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:56932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpG3jZBu2q05ozVU9ZSQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:32.703168 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:44068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpINSswJuvopo3lOhgbAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:38.244496 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:36872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpJo6lpbStxTqkSkttuQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:40.489775 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:56934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpKNSswJuvopo3lOhgcQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:40.624063 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:33354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpKJqj1wV0Si-OkefvjAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:46.170078 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:33356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpLQlT9VtDQc7bgUy0HAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:03.359015 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:37514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpP9SswJuvopo3lOhgigAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:05.769329 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpQXjZBu2q05ozVU9ZZgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:07.044585 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:47720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpQ3bQATo66fKoS7xRpQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:14.647078 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:47730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpSnbQATo66fKoS7xRrgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:18.610461 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:58494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpTv9ocpUE4ed4uDzwewAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:23.200078 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:42858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpU7ABkC4fWIHEf8HsjQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:01:24.423898 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:58502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpVLysWC90G-1nBrBG5AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:26.811694 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:41882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpVhXjF1vJNtV6CWr3zQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:28.104128 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:41890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpWAlT9VtDQc7bgUy0NgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:29.339829 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:41896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpWZqj1wV0Si-OkefvrwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:33.061487 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:34210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpXdSswJuvopo3lOhgngAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:34.355750 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:49696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpXpqj1wV0Si-OkefvsQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:36.906167 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:46086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpYI6lpbStxTqkSktt1gAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:38.194099 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:46102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpYtSswJuvopo3lOhgnwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:50.177492 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:49704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpbpqj1wV0Si-OkefvxgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:52.935665 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:49990] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgpcI6lpbStxTqkSktt2gAAAkw"]
[Mon Mar 16 13:02:07.772121 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:44596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpfwlT9VtDQc7bgUy0WgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:02:11.163139 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:42210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpg9SswJuvopo3lOhgsQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:12.481259 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:42222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgphHjZBu2q05ozVU9ZggAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:34.246755 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:42238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpmo6lpbStxTqkSktuAgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 13:02:54.719884 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:46118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgprrABkC4fWIHEf8Hs6gAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:56.030959 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:38440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsAlT9VtDQc7bgUy0gQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:57.171222 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:38442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsbysWC90G-1nBrBHBQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:57.448667 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsbysWC90G-1nBrBHBgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:58.747742 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:38456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsv9ocpUE4ed4uDzwmAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:00.024899 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:38468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgptJqj1wV0Si-Okefv3QAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:03.506970 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:51058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpt46lpbStxTqkSktuDwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:04.841985 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:51070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpuJqj1wV0Si-Okefv4AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:06.127512 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:51074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpupqj1wV0Si-Okefv5QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:08.637135 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:51084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpvJqj1wV0Si-Okefv6wAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:10.030424 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:51094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpvglT9VtDQc7bgUy0kAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:12.371339 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:56936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpwBXjF1vJNtV6CWr4JwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:13.688430 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:56946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpwXbQATo66fKoS7xR4AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:17.032802 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:56948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxRXjF1vJNtV6CWr4KQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:18.451572 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:56964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxpqj1wV0Si-Okefv7wAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:19.163461 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:51102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxwlT9VtDQc7bgUy0mAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:20.703085 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:56976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxwlT9VtDQc7bgUy0mQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:22.051028 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:59880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpyv9ocpUE4ed4uDzwpAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:23.402023 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:59888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpy7ABkC4fWIHEf8Hs9wAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:24.711619 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:59900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpzLysWC90G-1nBrBHDAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:28.591462 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:59902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0AlT9VtDQc7bgUy0rQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:29.939034 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:59906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0XbQATo66fKoS7xR5wAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:30.585684 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:52566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0glT9VtDQc7bgUy0rwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:33.425200 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:43572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp1Y6lpbStxTqkSktuKAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:34.719164 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:43586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp1nbQATo66fKoS7xR6wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:37.011974 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:43600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp2Zqj1wV0Si-Okefv-AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:40.378857 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:43602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp3HbQATo66fKoS7xR7gAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:03.291560 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:45780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp83jZBu2q05ozVU9Z1AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:04:04.244763 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:56244] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgp9HjZBu2q05ozVU9Z1QAAAU0"]
[Mon Mar 16 13:04:05.620279 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:36412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp9f9ocpUE4ed4uDzwsQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:20.337054 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:36414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqBLABkC4fWIHEf8HtDwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:04:21.436485 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:60312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqBXbQATo66fKoS7xSFwAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:26.671186 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:35326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqCbABkC4fWIHEf8HtFQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:26.674872 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:32872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqCv9ocpUE4ed4uDzwvAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:29.128686 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:32874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqDdSswJuvopo3lOhhJAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:04:32.898006 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:35336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqEAlT9VtDQc7bgUy07gAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:34.174607 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:41248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqEtSswJuvopo3lOhhKQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:35.351071 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:41264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqE9SswJuvopo3lOhhLAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:36.562704 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFHjZBu2q05ozVU9Z4wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:37.823375 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:41280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFRXjF1vJNtV6CWr4OAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:38.977890 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:41282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFhXjF1vJNtV6CWr4OQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:05:02.474054 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:35732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqLglT9VtDQc7bgUy1LQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:03.820538 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:58566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqL3bQATo66fKoS7xSHQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:05.123035 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:58568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqMY6lpbStxTqkSktuOwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:07.546417 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:58584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqM9SswJuvopo3lOhhNgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:14.072871 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:58596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqOpqj1wV0Si-OkefwFgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:16.475583 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPHjZBu2q05ozVU9aEAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:17.850216 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:60134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPbABkC4fWIHEf8HtPAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:19.161317 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:60146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPwlT9VtDQc7bgUy1QwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:20.430225 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqQAlT9VtDQc7bgUy1RwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:23.334250 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:45926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqQpqj1wV0Si-OkefwGgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:25.761405 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:45940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqRbABkC4fWIHEf8HtRgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:27.104856 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:45946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqR7ysWC90G-1nBrBHKwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:28.386787 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:45960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSNSswJuvopo3lOhhOgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:29.662823 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSRXjF1vJNtV6CWr4QwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:30.983053 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:42984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSnjZBu2q05ozVU9aIgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:33.348877 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:42988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqTQlT9VtDQc7bgUy1UQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:37.766011 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:42990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqUXjZBu2q05ozVU9aLQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:39.111035 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:42992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqU_9ocpUE4ed4uDzwyAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:40.265341 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:48688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqVNSswJuvopo3lOhhQQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:41.630785 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:48696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqVdSswJuvopo3lOhhQgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:44.230263 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:48706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWNSswJuvopo3lOhhRAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:45.532904 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:48722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWbABkC4fWIHEf8HtYQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:46.685067 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWrysWC90G-1nBrBHLQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:47.963017 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:48736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWwlT9VtDQc7bgUy1VwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:48.355683 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:53870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXHjZBu2q05ozVU9aOQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:05:49.234058 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:48738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXRXjF1vJNtV6CWr4RgAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:50.502801 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:47118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXtSswJuvopo3lOhhRQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:51.843072 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:47130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqX7ABkC4fWIHEf8HtZwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:53.699180 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:47140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqYbABkC4fWIHEf8HtaAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:54.965954 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:47148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqYo6lpbStxTqkSktuSAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:57.431207 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:47162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqZP9ocpUE4ed4uDzw2gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:59.737911 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:47164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqZ_9ocpUE4ed4uDzw3wAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:02.158091 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqarABkC4fWIHEf8HtcwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:03.477297 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:34704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqa9SswJuvopo3lOhhRgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:04.782000 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqbLysWC90G-1nBrBHNAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:07.057084 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:34730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqbxXjF1vJNtV6CWr4TAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:08.418660 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:34732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqcHbQATo66fKoS7xSKgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:09.811463 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:34734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqcXbQATo66fKoS7xSLAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:12.366155 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:43276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqdI6lpbStxTqkSktuTAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:14.678013 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:43292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqdrysWC90G-1nBrBHOAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:15.585477 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:44816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqd5qj1wV0Si-OkefwPQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:16.140278 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:43302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqeP9ocpUE4ed4uDzw7QAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:17.447968 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:43306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqebysWC90G-1nBrBHOQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:19.640205 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:43308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqetSswJuvopo3lOhhSQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:20.934884 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqfLysWC90G-1nBrBHOgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:24.288270 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:48264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgJqj1wV0Si-OkefwQQAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:25.581029 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:48274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgQlT9VtDQc7bgUy1ZgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:26.903005 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:48282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgnjZBu2q05ozVU9aTAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:32.403875 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:48284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqiI6lpbStxTqkSktuVwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:33.662600 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:49698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqiRXjF1vJNtV6CWr4UgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:34.959245 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:49700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqio6lpbStxTqkSktuWQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:37.259091 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:49710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqjdSswJuvopo3lOhhTgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:38.598259 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:49720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqjnjZBu2q05ozVU9aWQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:39.870204 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:49732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqj_9ocpUE4ed4uDzw8QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:42.075161 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqkv9ocpUE4ed4uDzw8wAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:43.450913 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:45972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqkwlT9VtDQc7bgUy1bAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:44.781364 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:45974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqlHjZBu2q05ozVU9aYAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:50.517119 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:45976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqmrABkC4fWIHEf8HtowAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:54.770702 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.228.16:60572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgqnXbQATo66fKoS7xSNwAAANQ"]
[Mon Mar 16 13:06:55.839616 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:40378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqn9SswJuvopo3lOhhWgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:00.339738 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:40386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqpJqj1wV0Si-OkefwTgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:34.743547 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:40500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqxo6lpbStxTqkSktuiQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:59.819065 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:51658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq37ysWC90G-1nBrBHZAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:07.716414 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:53038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq5wlT9VtDQc7bgUy1iQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:13.465369 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:53054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq7Y6lpbStxTqkSktulQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:21.227309 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:46310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq9Zqj1wV0Si-OkefwbAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:23.903089 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:60344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq97ysWC90G-1nBrBHawAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:28.837226 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:60356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq_AlT9VtDQc7bgUy1kAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:30.213209 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:34308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq_nbQATo66fKoS7xSVQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:33.272178 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:60366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrAZqj1wV0Si-OkefwdAAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:34.588785 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrApqj1wV0Si-OkefwdQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:34.762148 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:39438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrAnbQATo66fKoS7xSWQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:44.195214 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:39446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrDLABkC4fWIHEf8HtygAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:54.495331 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrFpqj1wV0Si-OkefwhgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:09:06.227193 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.244.31:47606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgrIv9ocpUE4ed4uDzxcQAAAhM"]
[Mon Mar 16 13:09:20.960275 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:40228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrMLABkC4fWIHEf8Ht7QAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:09:42.605083 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:42908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrRrABkC4fWIHEf8HuAQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:09:45.082213 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:47782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrSXbQATo66fKoS7xSZQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:09:55.166275 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:47792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrU7ysWC90G-1nBrBHggAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:10:46.814638 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:40824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrhnjZBu2q05ozVU9bNQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:01.591348 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:50048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrlY6lpbStxTqkSktu4QAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:10.632287 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:58596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrnglT9VtDQc7bgUy1tAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:16.951654 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:42622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrpAlT9VtDQc7bgUy1uQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 13:11:23.354587 2026] [:error] [pid 15968:tid 140411607643904] [client 74.7.243.203:41776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrq69Q3DFy3Odql0Cu9QAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:26.853522 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:59814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrrpqj1wV0Si-OkefwqAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:27.878924 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:53274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrr5qj1wV0Si-OkefwqQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:29.307168 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:49466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrsXjZBu2q05ozVU9bOQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:32.891588 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:59830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrtP9ocpUE4ed4uDzxlAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:01.795825 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:46482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr0Y6lpbStxTqkSktu_wAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:03.107518 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:38476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr06QpVkWug9HeOt84XQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:03.647828 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:49472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr06TCbgAP5jq5TegsfQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:06.667531 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:38480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr1v9ocpUE4ed4uDzxnQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:10.122230 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:38486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr2lajLEzk2WiQ-10VvQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:14.521098 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:36712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr3nbQATo66fKoS7xSgQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:15.668618 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:42482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr3wlT9VtDQc7bgUy1-AAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:17.075994 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:38660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr4XbQATo66fKoS7xSgwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:23.467117 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:33212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr56QpVkWug9HeOt84ZAAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:27.343669 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:33228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr6wlT9VtDQc7bgUy2BQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:42.058191 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:38516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr-tSswJuvopo3lOhhqQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:46.125913 2026] [:error] [pid 15329:tid 140411616036608] [client 74.7.243.203:42498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr_h1q6tjNW06wcg32MgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:47.410933 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:45800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr_46lpbStxTqkSktvBAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:54.289921 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:45812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsBpqj1wV0Si-OkefwxgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:13:55.639096 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:46216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsQ46lpbStxTqkSktvKAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:06.402779 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:33598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgsTtSswJuvopo3lOhh7QAAAIA"]
[Mon Mar 16 13:14:08.243254 2026] [:error] [pid 15329:tid 140411649607424] [client 74.7.241.46:44892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsUB1q6tjNW06wcg32RQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:14:26.735875 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:56374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsYtSswJuvopo3lOhiBgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:28.067015 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:57250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsZKTCbgAP5jq5TegslwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:34.173520 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:57264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsaqQpVkWug9HeOt84ewAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:14:35.478384 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:50594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsa9SswJuvopo3lOhiCQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:14:50.075403 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:40068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsepqj1wV0Si-OkefxLgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:34.796011 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:50606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgspnjZBu2q05ozVU9bggAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:15:38.428958 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:55622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsqo6lpbStxTqkSktvMgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:40.191359 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:35436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsrJqj1wV0Si-OkefxgQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:40.866675 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:55636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsrKQpVkWug9HeOt84ggAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:16:21.219245 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:40150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs1f9ocpUE4ed4uDzx5AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:16:28.015206 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs3AlT9VtDQc7bgUy2fwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:16:51.958082 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:45084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs86TCbgAP5jq5Tegs4QAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:17:58.565426 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:53670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtNqTCbgAP5jq5TegtSwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:03.264038 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:42016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtO6TCbgAP5jq5TegtUgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:18:05.603411 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:49574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtPZqj1wV0Si-OkefxlwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:23.859839 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtT6TCbgAP5jq5TegtbgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:26.448263 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:42366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtUpqj1wV0Si-OkefxoQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:18:37.184624 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtXdSswJuvopo3lOhibQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:47.793700 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:42374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtZ6QpVkWug9HeOt84pQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:07.927888 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:37810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgte46lpbStxTqkSktvXAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:09.269901 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:44198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtfbysWC90G-1nBrBH4AAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:55.389337 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:60594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtq7ABkC4fWIHEf8HunwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:16.917988 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:48872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtwI6lpbStxTqkSktvmQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:30.492402 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:58648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtzVajLEzk2WiQ-10V8gAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:33.217026 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgt0f9ocpUE4ed4uDzyKgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:17.870979 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgt_Zqj1wV0Si-Okefx-QAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:21:25.776617 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:54374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguBVajLEzk2WiQ-10WIAAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:29.670434 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.243.203:58064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguCaTCbgAP5jq5TegthQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:36.820651 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:42762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguEP9ocpUE4ed4uDzyRwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:40.252358 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:42772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguFNSswJuvopo3lOhigAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:45.304593 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:60382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguGVajLEzk2WiQ-10WJwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:57.693290 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:60384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguJdSswJuvopo3lOhikAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:22:00.006942 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:35506] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abguKHjZBu2q05ozVU9b2AAAAVA"]
[Mon Mar 16 13:22:08.340485 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguMP9ocpUE4ed4uDzybAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:22:10.872532 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:60050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguMv9ocpUE4ed4uDzycQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:22:13.211473 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:48148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguNY6lpbStxTqkSktvowAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:23:52.591436 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:57832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgumKTCbgAP5jq5TegtuwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:24:09.231274 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.244.31:45066] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abguqXjZBu2q05ozVU9cFQAAAUI"]
[Mon Mar 16 13:24:42.744275 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguyqQpVkWug9HeOt85SAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:24:54.273635 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:53674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu1qQpVkWug9HeOt85XgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:00.096019 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:56220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu3Jqj1wV0Si-OkefyPAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:08.315405 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:41218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu5I6lpbStxTqkSktvrwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:14.776473 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:41230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu6v9ocpUE4ed4uDzzIwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:17.186982 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:42588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu7Zqj1wV0Si-OkefyQQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:18.554904 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:42602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu7rABkC4fWIHEf8HuygAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:20.870172 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:42604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu8KTCbgAP5jq5Tegt4wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:25.113474 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:59834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu9f9ocpUE4ed4uDzzJgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:29.769313 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:39662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu-aTCbgAP5jq5Tegt7QAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:32.308272 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:50692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_KTCbgAP5jq5Tegt7wAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:33.541505 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:50702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_dSswJuvopo3lOhisAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:35.021668 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:59848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_7ABkC4fWIHEf8Hu2gAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:42.540424 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:39240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvBrABkC4fWIHEf8Hu8gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:26:52.639771 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:50716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvTLABkC4fWIHEf8HveAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 13:26:55.133437 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:37914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvT6QpVkWug9HeOt85gQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:27:02.245024 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:53046] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgvVrABkC4fWIHEf8HvgQAAAEg"]
[Mon Mar 16 13:28:37.008833 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:37920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvtY6lpbStxTqkSktwGAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:29:11.408989 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.244.31:51032] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgv15qj1wV0Si-Okefy4wAAAAQ"]
[Mon Mar 16 13:29:11.890934 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:46782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgv15qj1wV0Si-Okefy5AAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:30:16.324378 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:54504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwF46lpbStxTqkSktwVAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:30:22.038481 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:60022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwHrysWC90G-1nBrBIawAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:32:01.504151 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwgbABkC4fWIHEf8HwVgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:02.697924 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.228.16:41478] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgwgqTCbgAP5jq5TeguOwAAAsQ"]
[Mon Mar 16 13:32:02.859451 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:37050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwglajLEzk2WiQ-10WfQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:04.172240 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:37052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwhKQpVkWug9HeOt86DgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:05.701993 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:37060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwhbysWC90G-1nBrBIhQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:10.346622 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:37070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwirysWC90G-1nBrBIiwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:12.988308 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:33502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwjNSswJuvopo3lOhjqQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:14.306900 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:33504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwjrysWC90G-1nBrBIjAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:22.563248 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:36644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwlqQpVkWug9HeOt86FQAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:32:27.614221 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwm5qj1wV0Si-OkefzEQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:28.902289 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:54970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwnKQpVkWug9HeOt86FwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:30.042165 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:41388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwntSswJuvopo3lOhjqwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:32.903477 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwoHjZBu2q05ozVU9cVwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:35.115388 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:41402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwolajLEzk2WiQ-10WgQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:41.963285 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:41408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwqXjZBu2q05ozVU9cXQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:43.245359 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:44612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwq6TCbgAP5jq5TeguTQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:44.573441 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:44614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwrP9ocpUE4ed4uDzzxgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:45.796909 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:44626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwrVajLEzk2WiQ-10WggAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:47.141261 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:44632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwr46lpbStxTqkSktwbQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:48.354090 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:44638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsNSswJuvopo3lOhjrAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:49.681034 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:44642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsZqj1wV0Si-OkefzJwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:50.999095 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:58722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsrABkC4fWIHEf8HweAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:52.215138 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:58736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwtLABkC4fWIHEf8HweQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:54.605241 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:58744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwttSswJuvopo3lOhjrwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:55.996138 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:58754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwt46lpbStxTqkSktwbwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:57.318331 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwubysWC90G-1nBrBIrQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:58.427359 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:58770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwurysWC90G-1nBrBIrwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:59.742092 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwu46lpbStxTqkSktwcAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:02.024191 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:33366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwvo6lpbStxTqkSktwcgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:03.619936 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:33378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwv6QpVkWug9HeOt86GwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:04.974949 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:33380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwwKQpVkWug9HeOt86HQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:06.310905 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwwlajLEzk2WiQ-10WhQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:08.470876 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:33410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgww5qj1wV0Si-OkefzOAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:16.384710 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:33426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwzKQpVkWug9HeOt86JwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:17.745057 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:36670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwzbABkC4fWIHEf8HwggAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:27.837079 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:36672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgw1rysWC90G-1nBrBI0AAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:00.639720 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:43948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgw-I6lpbStxTqkSktwkgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:13.838817 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.244.31:46052] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgxBdSswJuvopo3lOhjugAAAIc"]
[Mon Mar 16 13:34:54.123387 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:41662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxLv9ocpUE4ed4uDz0DgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:56.537605 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:36558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxMLABkC4fWIHEf8HwoAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:57.938372 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:36570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxMbABkC4fWIHEf8HwoQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:59.262358 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:36586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxM6QpVkWug9HeOt86VwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:35:03.631530 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:51494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxN6QpVkWug9HeOt86XQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:18.937887 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:44554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxgpqj1wV0Si-OkefzxQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:20.239440 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxhI6lpbStxTqkSktwngAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:23.609320 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:39126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxh5qj1wV0Si-OkefzzQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:36:26.139819 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:39136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxinjZBu2q05ozVU9c1QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:27.513826 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:39148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxi7ABkC4fWIHEf8HwtgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:28.892536 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:51854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxjLysWC90G-1nBrBJFgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:33.314994 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:51856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxkaTCbgAP5jq5TeguagAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:36:34.642128 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:51858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxkqTCbgAP5jq5TegubAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:37:03.085656 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.228.16:54462] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgxr7ABkC4fWIHEf8HwwQAAAEQ"]
[Mon Mar 16 13:37:27.255359 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:51868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxx3jZBu2q05ozVU9dIgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:39:14.729668 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:46392] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgyMrABkC4fWIHEf8HxPQAAAEI"]
[Mon Mar 16 13:40:36.397811 2026] [mime_magic:error] [pid 14895:tid 140411708356352] (70014)End of file found: [client 74.7.241.46:38468] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root
[Mon Mar 16 13:42:03.206869 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.228.16:54192] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgy23jZBu2q05ozVU9dSwAAAVc"]
[Mon Mar 16 13:42:15.975380 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:58926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy546lpbStxTqkSktxzAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:17.324763 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:55246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy6aTCbgAP5jq5TegvigAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:18.492920 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:57982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy6rABkC4fWIHEf8HxaAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:21.940214 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:57992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy7bABkC4fWIHEf8HxawAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:24.311583 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:57996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy8FajLEzk2WiQ-10XAwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:25.561601 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:58006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy8Zqj1wV0Si-Okef0gAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:34.728004 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:58012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy-lajLEzk2WiQ-10XDgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:40.635875 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:60800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzAHjZBu2q05ozVU9dVAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:52.792163 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:57128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzDNSswJuvopo3lOhkFQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:43:43.543482 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:60788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzP6TCbgAP5jq5TegvxwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:21.951539 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:45552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzoaTCbgAP5jq5TegwLAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:25.095817 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:51558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzpbABkC4fWIHEf8HyOgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:51.588139 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:45750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzv3jZBu2q05ozVU9dsQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:54.211383 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:52126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzwlajLEzk2WiQ-10XLQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:56.795529 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:52128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzxFajLEzk2WiQ-10XMAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:03.506393 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:52142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzy46lpbStxTqkSktyQQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:37.895916 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz7aTCbgAP5jq5TegwWQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:39.253504 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:55766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz76QpVkWug9HeOt87CwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:40.458955 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:41286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz8NSswJuvopo3lOhkjAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:41.795269 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:41294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz8aQpVkWug9HeOt87DAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:43.862955 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:51560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz89SswJuvopo3lOhkkAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:44.094135 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:41300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz9NSswJuvopo3lOhkkQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:46.409088 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:41308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz9Y6lpbStxTqkSktyRQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:47.764180 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:41316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz96QpVkWug9HeOt87DgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:49.845013 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:41332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz-dSswJuvopo3lOhkkgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:53.421356 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:50704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz_XjZBu2q05ozVU9duAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:54.771222 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:50712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz_qTCbgAP5jq5TegwWwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:56.132005 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:50726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AKTCbgAP5jq5TegwXAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:57.447621 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:50728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AdSswJuvopo3lOhklgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:58.725186 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:50736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AnjZBu2q05ozVU9dugAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:00.140830 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:50748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0BNSswJuvopo3lOhklwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:02.603786 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.243.203:54980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0BqTCbgAP5jq5TegwYAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:03.914077 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:54996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0B9SswJuvopo3lOhkmQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:04.535897 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.228.16:53338] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg0CI6lpbStxTqkSktySAAAAk4"]
[Mon Mar 16 13:47:05.276913 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0CY6lpbStxTqkSktySQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:07.954892 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:55000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0CrysWC90G-1nBrBJ9AAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:10.312347 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:55012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0DXjZBu2q05ozVU9dvQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:13.797408 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Ef9ocpUE4ed4uDz0iAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:17.206295 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:41002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0FdSswJuvopo3lOhkngAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:19.616236 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:41018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0F1ajLEzk2WiQ-10XPQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:20.947078 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0GP9ocpUE4ed4uDz0kgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:23.242959 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:55292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Gpqj1wV0Si-Okef0xQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:24.656265 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:55306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0HKTCbgAP5jq5TegwZwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:27.091325 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:55318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0H9SswJuvopo3lOhkoAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:28.425402 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:55330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0INSswJuvopo3lOhkoQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:29.639744 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:55334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0IVajLEzk2WiQ-10XQAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:32.010229 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:45094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0JLABkC4fWIHEf8HyqQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:35.388059 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:45104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0J_9ocpUE4ed4uDz0mQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:36.730633 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:45106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0KP9ocpUE4ed4uDz0mgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:37.868350 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:45120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0KbABkC4fWIHEf8HysgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:39.159147 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:45122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0K9SswJuvopo3lOhkpQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:40.468077 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0LP9ocpUE4ed4uDz0mwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:41.864628 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:37858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0LaTCbgAP5jq5TegwaQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:44.362982 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:37874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0MP9ocpUE4ed4uDz0ngAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:45.691762 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:37888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Mf9ocpUE4ed4uDz0oQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:50.584070 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:37904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0NlajLEzk2WiQ-10XSgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:51.885776 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:45172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0N7ABkC4fWIHEf8HyzwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:53.031210 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:45178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0OaTCbgAP5jq5TegwbAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:54.228150 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:45192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Ov9ocpUE4ed4uDz0pAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:55.558826 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:45196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0O1ajLEzk2WiQ-10XTgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:58.065232 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:45210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Pv9ocpUE4ed4uDz0qAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:59.378796 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:45220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0P5qj1wV0Si-Okef0yQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:07.491167 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:45666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0R6TCbgAP5jq5TegwjgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:08.807904 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:45682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0SHjZBu2q05ozVU9d0QAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:10.167379 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:35660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0SnjZBu2q05ozVU9d1AAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:20.314873 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:35674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0U5qj1wV0Si-Okef02AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:29.807579 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:60258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0XXjZBu2q05ozVU9d3gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:50.013037 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:38840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0cpqj1wV0Si-Okef07wAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:51.251627 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:37616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0c6QpVkWug9HeOt87LAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:01.500680 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:37624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0fVajLEzk2WiQ-10XbAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:04.593312 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:38488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0gHjZBu2q05ozVU9d4gAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:05.883802 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0gbysWC90G-1nBrBKXQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:13.864797 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:38500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0idSswJuvopo3lOhk5gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:18.766340 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:51936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg0jtSswJuvopo3lOhk6wAAAIo"]
[Mon Mar 16 13:49:18.880795 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:39184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0jtSswJuvopo3lOhk7AAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:58.935265 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:33220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0to6lpbStxTqkSktyggAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:01.677603 2026] [access_compat:error] [pid 21805:tid 140411582465792] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fyiiz.php
[Mon Mar 16 13:50:01.850914 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/web.php
[Mon Mar 16 13:50:02.052481 2026] [access_compat:error] [pid 21805:tid 140411540502272] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dragonshell.php
[Mon Mar 16 13:50:02.231050 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/to.php
[Mon Mar 16 13:50:02.391608 2026] [access_compat:error] [pid 21805:tid 140411733534464] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xc0252.php
[Mon Mar 16 13:50:03.078725 2026] [access_compat:error] [pid 15568:tid 140411574073088] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/595.php
[Mon Mar 16 13:50:03.122932 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:46258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0u6QpVkWug9HeOt87XQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:50:03.227492 2026] [access_compat:error] [pid 15568:tid 140411725141760] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/webadmin.php
[Mon Mar 16 13:50:03.356773 2026] [access_compat:error] [pid 15568:tid 140411733534464] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/x1.php
[Mon Mar 16 13:50:03.487897 2026] [access_compat:error] [pid 15568:tid 140411540502272] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0.php
[Mon Mar 16 13:50:03.630484 2026] [access_compat:error] [pid 15568:tid 140411691570944] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/scbpb.php
[Mon Mar 16 13:50:03.935100 2026] [access_compat:error] [pid 10772:tid 140411666392832] [client 20.151.2.242:59620] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yaiid.php
[Mon Mar 16 13:50:04.843216 2026] [access_compat:error] [pid 14895:tid 140411725141760] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ta0ol.php
[Mon Mar 16 13:50:04.982557 2026] [access_compat:error] [pid 14895:tid 140411574073088] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v3.php
[Mon Mar 16 13:50:05.128798 2026] [access_compat:error] [pid 14895:tid 140411658000128] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xvs.php
[Mon Mar 16 13:50:05.282652 2026] [access_compat:error] [pid 14895:tid 140411649607424] [client 20.151.2.242:59644] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fss.php
[Mon Mar 16 13:50:05.756338 2026] [access_compat:error] [pid 21805:tid 140411565680384] [client 20.151.2.242:59658] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xwx1.php
[Mon Mar 16 13:50:05.890767 2026] [access_compat:error] [pid 14895:tid 140411674785536] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Mon Mar 16 13:50:06.037332 2026] [access_compat:error] [pid 14895:tid 140411590858496] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ass.php
[Mon Mar 16 13:50:06.179106 2026] [access_compat:error] [pid 14895:tid 140411616036608] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gkl.php
[Mon Mar 16 13:50:06.316655 2026] [access_compat:error] [pid 21533:tid 140411548894976] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wps.php
[Mon Mar 16 13:50:06.448958 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/flower.php
[Mon Mar 16 13:50:06.582310 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yifsx.php
[Mon Mar 16 13:50:06.629095 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:56034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0vv9ocpUE4ed4uDz0zgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:06.723310 2026] [access_compat:error] [pid 21533:tid 140411683178240] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ng.php
[Mon Mar 16 13:50:06.856796 2026] [access_compat:error] [pid 21533:tid 140411582465792] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/app.php
[Mon Mar 16 13:50:06.998632 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sw.php
[Mon Mar 16 13:50:07.132388 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vfr.php
[Mon Mar 16 13:50:07.283126 2026] [access_compat:error] [pid 21533:tid 140411616036608] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wgift1.php
[Mon Mar 16 13:50:07.413097 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/torsa1.php
[Mon Mar 16 13:50:07.542339 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/zogy1.php
[Mon Mar 16 13:50:07.690381 2026] [access_compat:error] [pid 21533:tid 140411708356352] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/zoper1.php
[Mon Mar 16 13:50:09.477527 2026] [access_compat:error] [pid 21533:tid 140411691570944] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/maint/Jcrop.php
[Mon Mar 16 13:50:09.635126 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Mon Mar 16 13:50:09.763694 2026] [access_compat:error] [pid 21533:tid 140411599251200] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/acjsn.php
[Mon Mar 16 13:50:09.898352 2026] [access_compat:error] [pid 21533:tid 140411666392832] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adnks.php
[Mon Mar 16 13:50:10.034787 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ahiqq.php
[Mon Mar 16 13:50:10.171190 2026] [access_compat:error] [pid 21533:tid 140411649607424] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/tool.php
[Mon Mar 16 13:50:10.799507 2026] [access_compat:error] [pid 21533:tid 140411733534464] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/an9.php
[Mon Mar 16 13:50:10.937325 2026] [access_compat:error] [pid 21533:tid 140411574073088] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aqups.php
[Mon Mar 16 13:50:11.066847 2026] [access_compat:error] [pid 21533:tid 140411741927168] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bpltp.php
[Mon Mar 16 13:50:11.222997 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/byp9.php
[Mon Mar 16 13:50:11.406299 2026] [access_compat:error] [pid 21533:tid 140411716749056] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fs9.php
[Mon Mar 16 13:50:11.567631 2026] [access_compat:error] [pid 21805:tid 140411666392832] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/genco.php
[Mon Mar 16 13:50:11.699342 2026] [access_compat:error] [pid 21805:tid 140411616036608] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/p23duw.php
[Mon Mar 16 13:50:11.832618 2026] [access_compat:error] [pid 21805:tid 140411658000128] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pu9.php
[Mon Mar 16 13:50:11.964679 2026] [access_compat:error] [pid 21805:tid 140411624429312] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pu8.php
[Mon Mar 16 13:50:12.095221 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Mon Mar 16 13:50:12.227769 2026] [access_compat:error] [pid 21805:tid 140411540502272] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aee.php
[Mon Mar 16 13:50:13.001114 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:56040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0xLABkC4fWIHEf8HzcAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:13.244406 2026] [access_compat:error] [pid 10772:tid 140411540502272] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/nc4.php
[Mon Mar 16 13:50:13.393506 2026] [access_compat:error] [pid 10772:tid 140411708356352] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vaza.php
[Mon Mar 16 13:50:13.540070 2026] [access_compat:error] [pid 10772:tid 140411565680384] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Mon Mar 16 13:50:13.677063 2026] [access_compat:error] [pid 10772:tid 140411548894976] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp9.php
[Mon Mar 16 13:50:13.823966 2026] [access_compat:error] [pid 10772:tid 140411733534464] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/4pocjn.php
[Mon Mar 16 13:50:13.973951 2026] [access_compat:error] [pid 10772:tid 140411574073088] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vir-v2.php
[Mon Mar 16 13:50:14.103841 2026] [access_compat:error] [pid 10772:tid 140411632822016] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gm.php
[Mon Mar 16 13:50:14.254310 2026] [access_compat:error] [pid 10772:tid 140411683178240] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/btx25.php
[Mon Mar 16 13:50:14.386018 2026] [access_compat:error] [pid 10772:tid 140411725141760] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v4.php
[Mon Mar 16 13:50:14.519173 2026] [access_compat:error] [pid 10772:tid 140411599251200] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v2.php
[Mon Mar 16 13:50:14.676675 2026] [access_compat:error] [pid 10772:tid 140411658000128] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Mon Mar 16 13:50:14.827617 2026] [access_compat:error] [pid 10772:tid 140411699963648] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wander.php
[Mon Mar 16 13:50:14.968018 2026] [access_compat:error] [pid 10772:tid 140411674785536] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/amax.php
[Mon Mar 16 13:50:15.103390 2026] [access_compat:error] [pid 10772:tid 140411741927168] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hckpe.php
[Mon Mar 16 13:50:15.243310 2026] [access_compat:error] [pid 10772:tid 140411624429312] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ht.php
[Mon Mar 16 13:50:15.394855 2026] [access_compat:error] [pid 10772:tid 140411557287680] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sd.php
[Mon Mar 16 13:50:15.599410 2026] [access_compat:error] [pid 10772:tid 140411590858496] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/blog.php
[Mon Mar 16 13:50:15.749995 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/maint/max.php
[Mon Mar 16 13:52:04.695866 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.228.16:37908] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg1NKQpVkWug9HeOt87cgAAA00"]
[Mon Mar 16 13:52:09.532354 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:54504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1OaQpVkWug9HeOt87fQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:52:10.914776 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:49890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1OrysWC90G-1nBrBKdwAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:52:24.740129 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1SLABkC4fWIHEf8H0JgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:53:52.220623 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:55444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1oFajLEzk2WiQ-10YVAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:10.759456 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:49900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1sv9ocpUE4ed4uDz1gwAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:19.305682 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.244.31:53096] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg1u6QpVkWug9HeOt87ogAAA08"]
[Mon Mar 16 13:54:19.331558 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:50160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1u46lpbStxTqkSktyvwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:25.308593 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1wbysWC90G-1nBrBKogAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:30.135578 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:59230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1xpqj1wV0Si-Okef1RQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:31.482371 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:38084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1x1ajLEzk2WiQ-10YXgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:33.551335 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1yKTCbgAP5jq5Tegw_AAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:35.051964 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:38102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1y5qj1wV0Si-Okef1SQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:38.460708 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:38106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1zY6lpbStxTqkSktyxQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:39.798985 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:48558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1z9SswJuvopo3lOhlNQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:40.994665 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:48564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg10HjZBu2q05ozVU9evAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:42.260184 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:48570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg10lajLEzk2WiQ-10YZAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:43.475633 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:48576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg107ysWC90G-1nBrBKrAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:44.650172 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:48584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg11LysWC90G-1nBrBKrgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:45.962638 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:48598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg11bysWC90G-1nBrBKsQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:49.431346 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:48614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg12Zqj1wV0Si-Okef1TwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:50.718822 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:41220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg12qQpVkWug9HeOt87sQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:51.930045 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:41234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg129SswJuvopo3lOhlOAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:53.297084 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:41250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg13Y6lpbStxTqkSktyygAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:54.495050 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:41252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg13tSswJuvopo3lOhlOgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:57.931053 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg14VajLEzk2WiQ-10YaQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:01.444665 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:49716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg15f9ocpUE4ed4uDz1swAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:20.997667 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:49732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1-FajLEzk2WiQ-10YfQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:24.398136 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:42052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1_P9ocpUE4ed4uDz1zgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:56:13.230902 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:42054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2LXjZBu2q05ozVU9fLgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:56:41.493332 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2SbABkC4fWIHEf8H0kAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:02.424986 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:52658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Xo6lpbStxTqkSktzDwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:03.767711 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:56102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2X_9ocpUE4ed4uDz2AQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:05.154815 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:49962] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg2YdSswJuvopo3lOhlWAAAAI4"]
[Mon Mar 16 13:57:06.241559 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:56110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2YqQpVkWug9HeOt870AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:07.131556 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.243.203:35224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Y1ajLEzk2WiQ-10YuwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:07.634623 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:56114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Y6TCbgAP5jq5TegxLAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:08.850422 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ZLABkC4fWIHEf8H0mAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:10.211325 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:39080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ZrysWC90G-1nBrBK-AAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:12.603242 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:39094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2aKQpVkWug9HeOt870gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:13.954429 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:39110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2adSswJuvopo3lOhlWwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:15.143974 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2a7ABkC4fWIHEf8H0mgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:16.562200 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:39122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2bKQpVkWug9HeOt871QAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:17.927062 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:39134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2bf9ocpUE4ed4uDz2CAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:19.306712 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:51670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2b6TCbgAP5jq5TegxLgAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:20.659806 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:51676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2cNSswJuvopo3lOhlXgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:21.903568 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:51688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2cXjZBu2q05ozVU9fPQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:24.483706 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:51696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2dLysWC90G-1nBrBLEQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:28.207582 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:51698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2eKTCbgAP5jq5TegxNgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:29.594950 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:59860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2eaTCbgAP5jq5TegxOQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:30.956575 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:59864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ev9ocpUE4ed4uDz2DQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:32.335275 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:59878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2fHjZBu2q05ozVU9fQQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:34.959475 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:59890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2faTCbgAP5jq5TegxPQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:36.403353 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:59900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2gHjZBu2q05ozVU9fQwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:37.639835 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:59912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2gbysWC90G-1nBrBLJwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:39.060022 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:59416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2g3jZBu2q05ozVU9fRQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:12.232738 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2pLysWC90G-1nBrBLZgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:39.100381 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:44104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2v1ajLEzk2WiQ-10Y5wAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:55.556170 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:59428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2z3jZBu2q05ozVU9fmwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:59:20.107039 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.244.31:36668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg26Jqj1wV0Si-Okef1twAAAA0"]
[Mon Mar 16 13:59:24.405858 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:37096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg27Jqj1wV0Si-Okef1vwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:04.001759 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:50700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3EbysWC90G-1nBrBLsAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:29.238115 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:54156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3LaQpVkWug9HeOt88GgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:44.819414 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:40850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3PKQpVkWug9HeOt88KgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:45.743044 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:38324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3PaQpVkWug9HeOt88LQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:49.697803 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:38328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3QaTCbgAP5jq5TegxiQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:51.048294 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:51596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Q6QpVkWug9HeOt88LgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:51.943935 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:34234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Q7ABkC4fWIHEf8H1cAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:52.380446 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:51600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3RI6lpbStxTqkSktzSwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:53.759518 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:51610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3RZqj1wV0Si-Okef16gAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:55.155679 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:51622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3R1ajLEzk2WiQ-10ZGgAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:57.571757 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:51636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3SdSswJuvopo3lOhlrQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:58.871903 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:51648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3So6lpbStxTqkSktzTAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:00.216812 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:54478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3TJqj1wV0Si-Okef17QAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:01.956914 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.243.203:54492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3TaTCbgAP5jq5TegxlwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:03.489632 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:54494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3T5qj1wV0Si-Okef17wAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:04.853613 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:54510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3UNSswJuvopo3lOhlrwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:06.118025 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:54522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Uo6lpbStxTqkSktzTwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:07.476114 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3U3jZBu2q05ozVU9gBwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:08.984559 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:54538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3VFajLEzk2WiQ-10ZIAAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:10.415886 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:54760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3VnjZBu2q05ozVU9gCwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:11.916479 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:54770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3V5qj1wV0Si-Okef18AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:13.262935 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Wf9ocpUE4ed4uDz2TwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:14.526072 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:54780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Wv9ocpUE4ed4uDz2UQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:17.107470 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:54794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3XbysWC90G-1nBrBL1gAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:18.475762 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:54806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Xo6lpbStxTqkSktzUAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:19.695083 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:54818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3X46lpbStxTqkSktzUgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:24.171670 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:54406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3ZJqj1wV0Si-Okef19AAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:25.469824 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:54420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3ZVajLEzk2WiQ-10ZIwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:26.795798 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:54428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Zpqj1wV0Si-Okef19QAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:28.307284 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:54430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3aLysWC90G-1nBrBL2QAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:29.688303 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.243.203:54446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3aVajLEzk2WiQ-10ZJAAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:33.263323 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:46114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3bVajLEzk2WiQ-10ZJwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:34.603338 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:46122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3brABkC4fWIHEf8H1eQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:35.767342 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3b_9ocpUE4ed4uDz2VgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:37.116073 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:46140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3cdSswJuvopo3lOhluwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:39.999681 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:46144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3c7ABkC4fWIHEf8H1fQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:41.312444 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:36410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3dVajLEzk2WiQ-10ZLAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:44.005515 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:36414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3eFajLEzk2WiQ-10ZLwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:45.330291 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:36420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3eVajLEzk2WiQ-10ZMAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:48.724115 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:36432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3fFajLEzk2WiQ-10ZNAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:50.051071 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:36442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3fo6lpbStxTqkSktzXAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:51.664863 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:37786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3f6TCbgAP5jq5TegxzQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:56.272017 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:37794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3hJqj1wV0Si-Okef1_gAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:58.995226 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3hf9ocpUE4ed4uDz2WQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:00.359520 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:57176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3iJqj1wV0Si-Okef1_wAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:05.024486 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:57180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3jZqj1wV0Si-Okef2AwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:06.149339 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.228.16:57358] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg3jtSswJuvopo3lOhlxAAAAIc"]
[Mon Mar 16 14:02:06.260188 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:57182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3jtSswJuvopo3lOhlxQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:07.639448 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:57188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3j5qj1wV0Si-Okef2BgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:08.935478 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:57196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3kHjZBu2q05ozVU9gHgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:10.345142 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:53062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3knjZBu2q05ozVU9gIAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:11.684553 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:53078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3k3jZBu2q05ozVU9gIgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:13.059511 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:53092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3laQpVkWug9HeOt88YgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:14.261935 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:53102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3lv9ocpUE4ed4uDz2WwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:15.564890 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:53106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3l9SswJuvopo3lOhlxwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:16.747530 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:53122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3mKTCbgAP5jq5Tegx5gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:19.244930 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3m7ABkC4fWIHEf8H1jAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:20.587306 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:46722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3nP9ocpUE4ed4uDz2XQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:24.304359 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:46728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3oLABkC4fWIHEf8H1kgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:29.131477 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:46740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3pf9ocpUE4ed4uDz2ZAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:30.475382 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:56566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3plajLEzk2WiQ-10ZPQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:31.865093 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:56572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3p6QpVkWug9HeOt88cQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:42.883963 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:56586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3sv9ocpUE4ed4uDz2bwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:45.329511 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:34008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3tbysWC90G-1nBrBL7AAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:55.566064 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:34018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3v6TCbgAP5jq5TegyEwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:59.225879 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:55658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3w3jZBu2q05ozVU9gKgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:00.614625 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:51382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3xJqj1wV0Si-Okef2DwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:06.398859 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:51390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3yrABkC4fWIHEf8H1qAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:07.731145 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:51396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3y5qj1wV0Si-Okef2EwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:09.016315 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:51402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3zXjZBu2q05ozVU9gLAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:31.989294 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:57968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg345qj1wV0Si-Okef2KQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:34.136813 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:37214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg35Y6lpbStxTqkSktzdQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:35.512283 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:37228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg359SswJuvopo3lOhl1QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:36.870462 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:37234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg36Jqj1wV0Si-Okef2LAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:41.807767 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:37246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg37VajLEzk2WiQ-10ZTQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:45.374841 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:43080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg38aTCbgAP5jq5TegyGwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:47.776714 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:43086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3846lpbStxTqkSktzeAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:49.072249 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:43094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg39Y6lpbStxTqkSktzegAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:54.831279 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3-tSswJuvopo3lOhl4gAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:08.375936 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4CKQpVkWug9HeOt88uwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:09.670982 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:52834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4CaTCbgAP5jq5TegyIgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:13.231708 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:46654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4DaTCbgAP5jq5TegyJwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:20.783168 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:50888] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg4FLABkC4fWIHEf8H1uAAAAE4"]
[Mon Mar 16 14:04:54.446716 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:51860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4No6lpbStxTqkSktziwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:57.538473 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:46664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4OXjZBu2q05ozVU9gYwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:59.831085 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:36690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4O9SswJuvopo3lOhmIAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:01.185573 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:56068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4PaTCbgAP5jq5TegyNAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:02.691368 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:56074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4PlajLEzk2WiQ-10ZZgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:06.959809 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:56084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4QrysWC90G-1nBrBMGQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:07.563446 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:51872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4Q5qj1wV0Si-Okef2SwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:08.283210 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:56098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4RFajLEzk2WiQ-10ZZwAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:10.489286 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:56102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4RY6lpbStxTqkSktzjQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:13.951575 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:54732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4SVajLEzk2WiQ-10ZagAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:15.287654 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4S9SswJuvopo3lOhmKwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:23.675509 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:54750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4U9SswJuvopo3lOhmOwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:26.196024 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4VrABkC4fWIHEf8H12wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:28.570416 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4WLysWC90G-1nBrBMHQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:12.751721 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:39798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4hLABkC4fWIHEf8H2DAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:14.083425 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:51402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4hnjZBu2q05ozVU9gcQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:21.022721 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:51414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4jZqj1wV0Si-Okef2XAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:36.298951 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:58620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4nLABkC4fWIHEf8H2HgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:37.652309 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:42282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4nbysWC90G-1nBrBMKAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:42.075470 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:37880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4ov9ocpUE4ed4uDz3SgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:54.547917 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:42298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4rtSswJuvopo3lOhmeAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:06.219713 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.228.16:41026] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg4ulajLEzk2WiQ-10ZhgAAApU"]
[Mon Mar 16 14:07:18.203466 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:36060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4xv9ocpUE4ed4uDz3YwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:18.239572 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:37030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4xrysWC90G-1nBrBMRwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:19.571404 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:32990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4x6TCbgAP5jq5TegyVgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:26.568969 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:59288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4zv9ocpUE4ed4uDz3bgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:30.455408 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:59298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg40lajLEzk2WiQ-10ZkQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:37.987361 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:38174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg42bABkC4fWIHEf8H2VQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:44.008673 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:56450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg44KTCbgAP5jq5TegyYAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:54.945439 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:58322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg46tSswJuvopo3lOhmjQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:57.409504 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:57134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg47bABkC4fWIHEf8H2cQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:06.159188 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:48462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg49rABkC4fWIHEf8H2eAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:08:14.423261 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:57150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4_njZBu2q05ozVU9glwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:18.099156 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:42014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5ArABkC4fWIHEf8H2fgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:19.401951 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:42030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5A6QpVkWug9HeOt89EwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:21.796832 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:33424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5BXjZBu2q05ozVU9gmgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:34.671770 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:33428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5EqTCbgAP5jq5TegydgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:45.906674 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:45360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5HbABkC4fWIHEf8H2jAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:46.711435 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:54656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5HrysWC90G-1nBrBMcwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:48.455288 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:49350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5IKQpVkWug9HeOt89GwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:12.715863 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:49364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5N7ysWC90G-1nBrBMhwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:17.943424 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:53180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5PaQpVkWug9HeOt89JQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:20.555811 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:51898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5QJqj1wV0Si-Okef2mQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:21.779842 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.244.31:54346] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg5QVajLEzk2WiQ-10ZsgAAApU"]
[Mon Mar 16 14:09:23.892928 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:53190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5Q7ysWC90G-1nBrBMjwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:27.442064 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:53372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5R46lpbStxTqkSkt0GQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:29.790201 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:53380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5SbABkC4fWIHEf8H2oQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:41.082615 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:33126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5VbABkC4fWIHEf8H2rwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:48.669854 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5XI6lpbStxTqkSkt0KwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:11.659117 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:43310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5c46lpbStxTqkSkt0RAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:13.060441 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:40196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5daTCbgAP5jq5TegylQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:17.715271 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:40208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5edSswJuvopo3lOhm3AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:19.115940 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:40216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5e6QpVkWug9HeOt89MgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:23.731260 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:36990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5f5qj1wV0Si-Okef2owAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:37.122421 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:36996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5jXjZBu2q05ozVU9gywAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:52.644702 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:33846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5nKTCbgAP5jq5TegysAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:39.603387 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:53552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5y6TCbgAP5jq5Tegy2wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:44.286482 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:45612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg50LysWC90G-1nBrBMrQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:54.331408 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:45624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg52rysWC90G-1nBrBMuAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:55.639593 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:51738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg52_9ocpUE4ed4uDz4CgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:14.847606 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg57pqj1wV0Si-Okef21gAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:16.412189 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg58HjZBu2q05ozVU9g4QAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:17.648759 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:36020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg58bABkC4fWIHEf8H21wAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:19.010058 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:41340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg586QpVkWug9HeOt89RAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:22.351193 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:41350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg59o6lpbStxTqkSkt0hQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:23.686511 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg59_9ocpUE4ed4uDz4EQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:24.495257 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:51752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-FajLEzk2WiQ-10Z8QAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:25.038140 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:41376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-aTCbgAP5jq5Tegy4AAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:26.205023 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:41388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-rysWC90G-1nBrBMuwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:27.012337 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:56992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-3jZBu2q05ozVU9g5AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:27.472836 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:41394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-1ajLEzk2WiQ-10Z8gAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:28.735568 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:42978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_NSswJuvopo3lOhnKQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:29.507300 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:56998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_bABkC4fWIHEf8H22wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:31.116887 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:42994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_6QpVkWug9HeOt89RwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:32.518615 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:43006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6AJqj1wV0Si-Okef22QAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:33.722331 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:43014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6AZqj1wV0Si-Okef22gAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:35.055894 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:43018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6A1ajLEzk2WiQ-10Z9AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:36.331230 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:43020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6BP9ocpUE4ed4uDz4FQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:37.636577 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:43022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6Bf9ocpUE4ed4uDz4FgAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:38.851666 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:33276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6BtSswJuvopo3lOhnKgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:40.195829 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:33280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6CKQpVkWug9HeOt89SAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:42.417336 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:33292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6CrABkC4fWIHEf8H23gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:43.747036 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:33294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6C3jZBu2q05ozVU9g5wAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:44.922322 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:33310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6DLABkC4fWIHEf8H23wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:46.195270 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6DrABkC4fWIHEf8H24QAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:47.627079 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:55560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6D7ysWC90G-1nBrBMywAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:48.446648 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:33328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6EHjZBu2q05ozVU9g6QAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:54.339524 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:43864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6FqQpVkWug9HeOt89UAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:02.200728 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:46484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6HqTCbgAP5jq5Tegy7QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:02.591509 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:36738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6HtSswJuvopo3lOhnOAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:13:04.526442 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ILysWC90G-1nBrBMzQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:11.321055 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:56216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6J7ABkC4fWIHEf8H26gAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:19.577993 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:52898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6L6QpVkWug9HeOt89WgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:23.127776 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6M7ABkC4fWIHEf8H27gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:40.884509 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:37654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6RHjZBu2q05ozVU9hBwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:51.952879 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:38902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6T5qj1wV0Si-Okef28QAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:55.567426 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:33680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6U5qj1wV0Si-Okef29gAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:14:22.640490 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.244.31:33214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg6blajLEzk2WiQ-10aTgAAAoQ"]
[Mon Mar 16 14:14:24.698549 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:33694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6cKQpVkWug9HeOt89dgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:28.057521 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:49594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6dFajLEzk2WiQ-10aWAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:29.392662 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:49608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ddSswJuvopo3lOhnTAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:30.696439 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:55972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6dqTCbgAP5jq5TegzBAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:31.875624 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:55976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6d6TCbgAP5jq5TegzBQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:34.227440 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:55992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6eo6lpbStxTqkSkt0vwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:35.628530 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:56008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6e3jZBu2q05ozVU9hMgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:39.987448 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:56010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6f9SswJuvopo3lOhnUAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:41.368189 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:41918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6gY6lpbStxTqkSkt0wgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:42.714616 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:41930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6go6lpbStxTqkSkt0wwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:44.075211 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:41946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hP9ocpUE4ed4uDz4OQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:45.398156 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:41948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hdSswJuvopo3lOhnUwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:46.703995 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:41952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hv9ocpUE4ed4uDz4OgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:47.915106 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:41966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6h6QpVkWug9HeOt89ewAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:49.199006 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:41980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6iZqj1wV0Si-Okef3AQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:50.415965 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:59090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6irysWC90G-1nBrBM3gAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:51.782548 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:59098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6i_9ocpUE4ed4uDz4OwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:52.992596 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:59112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jP9ocpUE4ed4uDz4PAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:54.140207 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:59128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jpqj1wV0Si-Okef3AgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:54.900353 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:48192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jlajLEzk2WiQ-10acgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:56.545871 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:59134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6kI6lpbStxTqkSkt0yAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:58.883100 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:59138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6kqTCbgAP5jq5TegzEAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:00.181029 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:52580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lKQpVkWug9HeOt89fgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:00.616431 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:34074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lFajLEzk2WiQ-10aeAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:02.186148 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:55008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lqQpVkWug9HeOt89fwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:02.757068 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:52590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ltSswJuvopo3lOhnVwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:03.364108 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:55018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6l5qj1wV0Si-Okef3BQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:04.045414 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:52602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mI6lpbStxTqkSkt0yQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:04.689057 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:55024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mHjZBu2q05ozVU9hTQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:06.045660 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:55030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mqTCbgAP5jq5TegzEQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:06.232022 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:52618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mrysWC90G-1nBrBM5AAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:07.292223 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6m6TCbgAP5jq5TegzEgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:07.544352 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:52634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6m6TCbgAP5jq5TegzFAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:09.689166 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:56628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6nHjZBu2q05ozVU9hUQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:10.717103 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:52644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6nrABkC4fWIHEf8H3BAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:11.039807 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:56642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6n6TCbgAP5jq5TegzFwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:12.223752 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:56652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6oNSswJuvopo3lOhnWQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:15.346846 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:42398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6o6QpVkWug9HeOt89hgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:16.767352 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:56658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6pKQpVkWug9HeOt89igAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:17.817944 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:42410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6paQpVkWug9HeOt89jAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:18.059168 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:56674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6pqQpVkWug9HeOt89jQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:20.188438 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:42418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qKQpVkWug9HeOt89kgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:20.344660 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:46210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qNSswJuvopo3lOhnXAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:21.695469 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:46218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qf9ocpUE4ed4uDz4QAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:24.002880 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rFajLEzk2WiQ-10afAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:25.325096 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:48056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rbABkC4fWIHEf8H3CAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:25.330108 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:46236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rVajLEzk2WiQ-10afQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:26.662384 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:48060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rrABkC4fWIHEf8H3CQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:27.731202 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6r_9ocpUE4ed4uDz4QwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:28.018713 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:48066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6sLABkC4fWIHEf8H3DQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:29.431365 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6saQpVkWug9HeOt89lQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:30.757019 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:34060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6sqQpVkWug9HeOt89lgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:31.502411 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:45710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6s3jZBu2q05ozVU9hZAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:32.860771 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:45720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6tI6lpbStxTqkSkt0zQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:34.169631 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:34074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ttSswJuvopo3lOhnXwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:38.156224 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:45732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6upqj1wV0Si-Okef3CgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:41.440783 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:34076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vf9ocpUE4ed4uDz4SwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:41.692694 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:60432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vaTCbgAP5jq5TegzHAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:42.848922 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:49116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vrABkC4fWIHEf8H3EAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:44.183794 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:49126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wNSswJuvopo3lOhnZgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:45.573149 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:49142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wVajLEzk2WiQ-10afwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:46.407671 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:60440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wtSswJuvopo3lOhnaAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:47.705440 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:60454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6w6QpVkWug9HeOt89mAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:51.822868 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:49152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6x9SswJuvopo3lOhnbQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:53.263949 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:44192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ydSswJuvopo3lOhncQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:54.586073 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:44202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ytSswJuvopo3lOhncgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:55.912091 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:44216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6y5qj1wV0Si-Okef3DAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:57.249704 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:44220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6zY6lpbStxTqkSkt0zwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:57.911971 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:60944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6zaQpVkWug9HeOt89qQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:58.473065 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:44236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6znjZBu2q05ozVU9hcgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:59.177894 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6z5qj1wV0Si-Okef3DQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:59.792489 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:44246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6z5qj1wV0Si-Okef3DgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:01.122042 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:41018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60bABkC4fWIHEf8H3FAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:02.587769 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:47892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60qTCbgAP5jq5TegzIAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:03.622374 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:41026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60_9ocpUE4ed4uDz4TgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:04.984164 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:41034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg61I6lpbStxTqkSkt00AAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:06.385363 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:41046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg61o6lpbStxTqkSkt00QAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:08.895224 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:47898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg62KQpVkWug9HeOt89tgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:09.880712 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:41054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg62VajLEzk2WiQ-10ahAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:11.260751 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:34084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg626TCbgAP5jq5TegzIwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:12.356007 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:45208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63KTCbgAP5jq5TegzJQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:13.466298 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:34092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63VajLEzk2WiQ-10ahgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:14.847947 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:34096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63qQpVkWug9HeOt89vQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:16.203793 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:34098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg64NSswJuvopo3lOhndAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:17.525476 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:34106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg64bysWC90G-1nBrBM7gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:22.830290 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:34116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg65pqj1wV0Si-Okef3EgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:29.135585 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:34810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg67aQpVkWug9HeOt89zgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:30.560179 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:34748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg67rysWC90G-1nBrBM8gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:31.945632 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:34764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg677ysWC90G-1nBrBM8wAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:33.346097 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:34780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg68dSswJuvopo3lOhndQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:35.875897 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:34790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg685qj1wV0Si-Okef3FAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:37.199991 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg69XjZBu2q05ozVU9hdgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:38.536880 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:34808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg69njZBu2q05ozVU9hdwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:41.049016 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:34812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6-f9ocpUE4ed4uDz4UwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:42.414612 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:54934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6-v9ocpUE4ed4uDz4VAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:48.366793 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:54940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7AI6lpbStxTqkSkt02wAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:51.976381 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7A_9ocpUE4ed4uDz4VwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:17:01.128846 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:45222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7DVajLEzk2WiQ-10aswAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:17:26.506847 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:47046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7JqTCbgAP5jq5TegzYQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:17:28.963328 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7KP9ocpUE4ed4uDz4WwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:18:47.188189 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:41018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7d6TCbgAP5jq5TegzsAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:13.348077 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:49964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7kaTCbgAP5jq5Tegz0AAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:14.707908 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:54688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7kqQpVkWug9HeOt8-HwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:17.000105 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7k46lpbStxTqkSkt05wAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:18.459694 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:40836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7lv9ocpUE4ed4uDz4bQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:19.850550 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:40842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7l7ABkC4fWIHEf8H3iQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:21.759329 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:45252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7mbABkC4fWIHEf8H3jAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:22.325808 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:40854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7mv9ocpUE4ed4uDz4bwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:23.101387 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.243.203:42654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7m1ajLEzk2WiQ-10awAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:24.498375 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:42660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nI6lpbStxTqkSkt06AAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:26.800938 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:42674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nrysWC90G-1nBrBNDAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:26.865380 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:40868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nrysWC90G-1nBrBNDQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:29.562588 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7oVajLEzk2WiQ-10axAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:30.906222 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:46302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7oqTCbgAP5jq5Tegz0wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:32.098633 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7pLysWC90G-1nBrBNDgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:35.199339 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:42676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7p9SswJuvopo3lOhnkAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:35.919515 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:46320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7p5qj1wV0Si-Okef3JAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:39.022491 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:46334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7qpqj1wV0Si-Okef3JgAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:39.023276 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:53834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7q46lpbStxTqkSkt07QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:40.342467 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:45686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rI6lpbStxTqkSkt07gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:41.420853 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:35182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rbysWC90G-1nBrBNEQAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:41.571724 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:45698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rbABkC4fWIHEf8H3jwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:45.811012 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:45714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7sZqj1wV0Si-Okef3LgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:47.206220 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7s_9ocpUE4ed4uDz4cgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:52.932618 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:51814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7uJqj1wV0Si-Okef3OQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:21.715037 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:51826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg71aTCbgAP5jq5Tegz8QAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:20:29.564627 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:43520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg73VajLEzk2WiQ-10azgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:30.924512 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:40438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg73qQpVkWug9HeOt8-JQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:32.122350 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:40446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74LABkC4fWIHEf8H3mQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:33.331798 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:40460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74bABkC4fWIHEf8H3mwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:34.672113 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:40468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74rABkC4fWIHEf8H3nAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:38.128619 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:40478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg75njZBu2q05ozVU9h7gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:47.349558 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7746lpbStxTqkSkt0_wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:49.698388 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:52478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg78aTCbgAP5jq5Tegz9QAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:49.947696 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:35196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg78Zqj1wV0Si-Okef3bwAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:52.083016 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:52490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79I6lpbStxTqkSkt1AgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:53.412335 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:52500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79VajLEzk2WiQ-10a0wAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:53.526135 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:43868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79f9ocpUE4ed4uDz4fAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:56.823587 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:52516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-FajLEzk2WiQ-10a2QAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:57.713334 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:43882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-aTCbgAP5jq5Tegz-AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:20:58.217074 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:59314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-rysWC90G-1nBrBNGAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:59.474214 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:59324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-_9ocpUE4ed4uDz4fgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:01.727317 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:59334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7_aTCbgAP5jq5Tegz-wAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:06.151289 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:59336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8AtSswJuvopo3lOhnxQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:08.587645 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:59340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8BNSswJuvopo3lOhnyQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:10.037927 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:41234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8BqTCbgAP5jq5Tegz_AAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:11.373089 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:41246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8B5qj1wV0Si-Okef3cQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:12.557472 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:41256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8CKQpVkWug9HeOt8-KwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:13.847958 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:41258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8CaQpVkWug9HeOt8-LAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:15.027003 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:41270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8C7ysWC90G-1nBrBNGwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:17.259622 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:43892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8DY6lpbStxTqkSkt1EgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:18.357854 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:41284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8DqTCbgAP5jq5Tegz_gAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:20.649198 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:57042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8ELysWC90G-1nBrBNHgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:23.079161 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:57050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8E5qj1wV0Si-Okef3dQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:37.939537 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8If9ocpUE4ed4uDz4lAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:21:39.290914 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:55708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8I6TCbgAP5jq5Teg0BAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:43.183208 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:37384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8J7ysWC90G-1nBrBNJQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:22:01.451251 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:37394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8ObABkC4fWIHEf8H31AAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:22:05.963430 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8PbABkC4fWIHEf8H33gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:22:08.125458 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.228.16:37040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg8QKTCbgAP5jq5Teg0CAAAAtM"]
[Mon Mar 16 14:22:55.091098 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8b7ABkC4fWIHEf8H4DQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:23:28.366712 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:48384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8kLysWC90G-1nBrBNUgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:23:31.972469 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:48590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8k_9ocpUE4ed4uDz4pQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:17.080353 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8wY6lpbStxTqkSkt1MQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:19.334343 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:48592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8w6QpVkWug9HeOt8-wgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:21.799392 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:57802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8xVajLEzk2WiQ-10a-gAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:23.799122 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:56008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg8x9SswJuvopo3lOhoIgAAAJg"]
[Mon Mar 16 14:24:27.485816 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:60358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8y9SswJuvopo3lOhoJgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:35.676371 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:60372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8046lpbStxTqkSkt1RgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:36.984855 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:51360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg81HjZBu2q05ozVU9iDQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:43.749291 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg827ysWC90G-1nBrBNXgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:47.035064 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8346lpbStxTqkSkt1UQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:24:48.378609 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:41048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84FajLEzk2WiQ-10bBQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:49.385624 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:60764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84VajLEzk2WiQ-10bBgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:50.679750 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:41064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84lajLEzk2WiQ-10bCgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:24:52.782948 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:40266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg85HjZBu2q05ozVU9iEAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:00.932827 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:40274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg87LABkC4fWIHEf8H4HwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:03.561789 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:44506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg873jZBu2q05ozVU9iEwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:13.163904 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:41068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8-dSswJuvopo3lOhoOwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:25:27.699986 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:44518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9B6TCbgAP5jq5Teg0VQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:32.199121 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:33222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9DP9ocpUE4ed4uDz4vwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:35.587634 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:34358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9D46lpbStxTqkSkt1WQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:36.031023 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:47746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9EKTCbgAP5jq5Teg0XQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:38.023385 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:34366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9Eo6lpbStxTqkSkt1WwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:41.492904 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:34382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9FdSswJuvopo3lOhoRwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:56.779950 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:44250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9JLABkC4fWIHEf8H4QwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:32.663949 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:46952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9SFajLEzk2WiQ-10bfQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:36.738261 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:59254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9TLABkC4fWIHEf8H4cwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:26:44.440425 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:39846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9VHjZBu2q05ozVU9iLAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:46.492519 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:56350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9VrABkC4fWIHEf8H4gAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:50.083752 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:33210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9WrysWC90G-1nBrBNbAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:27:08.516053 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.228.16:42656] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg9bFajLEzk2WiQ-10bmAAAAoc"]
[Mon Mar 16 14:27:16.962933 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:38792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9dI6lpbStxTqkSkt1hAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:27:29.619160 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:33196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9gbysWC90G-1nBrBNjQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:27:36.016635 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:36428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9iKTCbgAP5jq5Teg0gwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:27:37.363335 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:38978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9iaTCbgAP5jq5Teg0hAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:07.271767 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:38982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9p6TCbgAP5jq5Teg0pAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:09.570962 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:33450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9qbABkC4fWIHEf8H4iQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:11.888790 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:45866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9q7ABkC4fWIHEf8H4iwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:13.245019 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:45882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9rY6lpbStxTqkSkt1iAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:20.443730 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:45898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9tFajLEzk2WiQ-10bogAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:22.811971 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:57548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9tv9ocpUE4ed4uDz40wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:25.179910 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:57560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9ubABkC4fWIHEf8H4jQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:37.999678 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:57566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9xf9ocpUE4ed4uDz43gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:40.314165 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:37530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9yKTCbgAP5jq5Teg0qAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:41.633962 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:43590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9ybysWC90G-1nBrBNkgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:49.347419 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:43602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg90Y6lpbStxTqkSkt1kAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:50.649580 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:59328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg90njZBu2q05ozVU9ieQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:28:51.813923 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:53002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg905qj1wV0Si-Okef3_gAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:53.184109 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:53018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg91VajLEzk2WiQ-10bqAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:56.731567 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:53022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg92LysWC90G-1nBrBNmAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:59.042297 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg923jZBu2q05ozVU9ifAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:00.383171 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:46334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg93I6lpbStxTqkSkt1kgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:10.542687 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:46340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg95pqj1wV0Si-Okef4BwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:11.847700 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:57676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg956TCbgAP5jq5Teg0swAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:16.515434 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:57684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg97LABkC4fWIHEf8H4mgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:23.797114 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.244.31:43236] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg983jZBu2q05ozVU9ifwAAAUE"]
[Mon Mar 16 14:29:30.075370 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:57690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9-lajLEzk2WiQ-10btwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:34.720423 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:42452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9_tSswJuvopo3lOhoggAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:39.768880 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:42468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-A7ysWC90G-1nBrBNogAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:42.147660 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:39558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-BlajLEzk2WiQ-10buQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:43.461268 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:39578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-B6QpVkWug9HeOt8_SAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:44.633953 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:39584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-CI6lpbStxTqkSkt1lQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:44.896095 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:41956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-CNSswJuvopo3lOhojQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:47.306104 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:39592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-C6QpVkWug9HeOt8_UAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:48.347545 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DKQpVkWug9HeOt8_UQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:49.615954 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:48890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DbABkC4fWIHEf8H4mwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:49.707741 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DY6lpbStxTqkSkt1mAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:50.821956 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:48904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Dpqj1wV0Si-Okef4EAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:52.107287 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:48910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EFajLEzk2WiQ-10bvQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:53.330702 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:48920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EaTCbgAP5jq5Teg0tgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:53.726216 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:49274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EVajLEzk2WiQ-10bvgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:54.623614 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:48926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ErABkC4fWIHEf8H4nAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:56.899187 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:48940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-FP9ocpUE4ed4uDz47wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:57.601014 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:49278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Ff9ocpUE4ed4uDz48AAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:58.179119 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:38318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-FrABkC4fWIHEf8H4nwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:59.311351 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:38326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-F6TCbgAP5jq5Teg0uAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:00.788511 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:38332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-GJqj1wV0Si-Okef4EwAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:03.852385 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:38334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-G3jZBu2q05ozVU9iogAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:05.161541 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:38348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-HZqj1wV0Si-Okef4FQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:07.581846 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:38360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-H5qj1wV0Si-Okef4GAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:09.935693 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:38782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-IVajLEzk2WiQ-10bwAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:11.224989 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:38784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-I_9ocpUE4ed4uDz49gAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:12.401581 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:38794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-JFajLEzk2WiQ-10bwgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:13.736424 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:38806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-JZqj1wV0Si-Okef4GQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:15.012742 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:38816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-J46lpbStxTqkSkt1mgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:16.322452 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:38826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-KKTCbgAP5jq5Teg0uwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:17.515524 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:38836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-KVajLEzk2WiQ-10bxAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:18.843352 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:51180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Kv9ocpUE4ed4uDz49wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:20.627920 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:51190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-LP9ocpUE4ed4uDz4-AAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:21.848979 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:51192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Lf9ocpUE4ed4uDz4-QAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:22.996703 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:51200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Lv9ocpUE4ed4uDz4-gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:24.064825 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:49282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MLABkC4fWIHEf8H4uQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:24.287410 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:51216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MI6lpbStxTqkSkt1mwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:25.456060 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:41040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MaTCbgAP5jq5Teg0vQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:25.499335 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:51218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MaQpVkWug9HeOt8_UwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:26.662003 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:51230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MrysWC90G-1nBrBNpwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:27.880732 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:51240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-M1ajLEzk2WiQ-10byAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:32.397254 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:60270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-OKQpVkWug9HeOt8_VwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:37.529218 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.243.203:41042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-PVajLEzk2WiQ-10b0gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:40.990895 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:45946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-QKTCbgAP5jq5Teg0zAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:47.295900 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:40614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-RqQpVkWug9HeOt8_XwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:48.580261 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:40620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-SKTCbgAP5jq5Teg01QAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:51.883710 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:40626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-S9SswJuvopo3lOhokgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:55.543163 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:34814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-TtSswJuvopo3lOholQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:31:27.896778 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:60280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-b6TCbgAP5jq5Teg1BQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:38.126261 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:44192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-eqTCbgAP5jq5Teg1DgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:39.466638 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:48708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-e3jZBu2q05ozVU9jDgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:42.430488 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:48710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-fXjZBu2q05ozVU9jFAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:43.740020 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:48718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-f1ajLEzk2WiQ-10b3wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:45.966829 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:48728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-gdSswJuvopo3lOhomwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:47.322383 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-g7ABkC4fWIHEf8H4vwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:48.508269 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:40800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-hHjZBu2q05ozVU9jIAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:49.783015 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:40808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-hXjZBu2q05ozVU9jJAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:51.163070 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-h6TCbgAP5jq5Teg1DwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:52.548313 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:40828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-iKQpVkWug9HeOt8_aAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:54.017493 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ilajLEzk2WiQ-10b4AAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:57.396273 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-jdSswJuvopo3lOhooAAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:58.698433 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:43952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-jrysWC90G-1nBrBNsgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:59.902865 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:43954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-j5qj1wV0Si-Okef4JAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:01.222237 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:43968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-kdSswJuvopo3lOhooQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:02.508122 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:43970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-kqQpVkWug9HeOt8_aQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:05.942777 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:43982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-lZqj1wV0Si-Okef4KAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:07.272064 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:43984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-l6TCbgAP5jq5Teg1EQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:08.593370 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.228.16:48022] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg-mNSswJuvopo3lOhoogAAAIo"]
[Mon Mar 16 14:32:15.259217 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:35494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-n46lpbStxTqkSkt1rQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:16.651638 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:35496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-oHjZBu2q05ozVU9jVAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:19.410643 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:35500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-o6TCbgAP5jq5Teg1FAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:20.737886 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:43120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-pHjZBu2q05ozVU9jXgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:22.083559 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:43132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-prysWC90G-1nBrBNtwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:23.214433 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:43138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-p6TCbgAP5jq5Teg1FQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:24.575383 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:43152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-qLysWC90G-1nBrBNuQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:27.265496 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:43154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-q3jZBu2q05ozVU9jawAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:28.928060 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:33728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-rHjZBu2q05ozVU9jcQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:30.100497 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:33730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-rnjZBu2q05ozVU9jdAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:32.518539 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:33746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-sKTCbgAP5jq5Teg1GAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:33.948357 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:33760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-sbABkC4fWIHEf8H40wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:35.220771 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:33764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-s_9ocpUE4ed4uDz5CwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:36.547581 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:33774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-tLysWC90G-1nBrBNuwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:37.760333 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:33780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-tXjZBu2q05ozVU9jiwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:39.199418 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:47780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-t3jZBu2q05ozVU9jjgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:39.705395 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:34828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-t3jZBu2q05ozVU9jjwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:32:40.543026 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:47782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-uNSswJuvopo3lOhoqAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:41.927427 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:47786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-uaQpVkWug9HeOt8_bQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:43.283869 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:47796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-u7ABkC4fWIHEf8H41wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:44.672989 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:47798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-vI6lpbStxTqkSkt1sgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:46.072651 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:47812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-vrABkC4fWIHEf8H42AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:47.723072 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:47816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-v5qj1wV0Si-Okef4LQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:48.928945 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:38534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-wJqj1wV0Si-Okef4LgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:50.256553 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:38542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-wv9ocpUE4ed4uDz5DwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:51.476173 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:38544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-w_9ocpUE4ed4uDz5EAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:52.788941 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:38558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-xLysWC90G-1nBrBNwAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:54.117303 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-xpqj1wV0Si-Okef4MQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:55.290658 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:38578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-x5qj1wV0Si-Okef4MgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:56.651887 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:38582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-yLysWC90G-1nBrBNwQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:58.041060 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:38584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ylajLEzk2WiQ-10b6wAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:00.248611 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:44614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-y1ajLEzk2WiQ-10b7AAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:01.824628 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:44620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-zbysWC90G-1nBrBNwwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:03.235443 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:44626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-z_9ocpUE4ed4uDz5EgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:04.511011 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:44634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-0FajLEzk2WiQ-10b7gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:05.887505 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:44636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-0bABkC4fWIHEf8H42wAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:07.095137 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:44648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-06TCbgAP5jq5Teg1LwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:08.392045 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:42580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1KQpVkWug9HeOt8_cgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:08.730730 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:48570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1KTCbgAP5jq5Teg1MQAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:09.627401 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:42596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1aQpVkWug9HeOt8_cwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:10.781125 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:42610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1o6lpbStxTqkSkt1uAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:11.030074 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:33318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-11ajLEzk2WiQ-10b8AAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:12.316982 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:42616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2I6lpbStxTqkSkt1uwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:13.607572 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:42630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2f9ocpUE4ed4uDz5EwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:14.791073 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2pqj1wV0Si-Okef4NwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:18.508697 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:42636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-3I6lpbStxTqkSkt1wAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:19.823237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:50544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-35qj1wV0Si-Okef4OAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:21.960290 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:38982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-4Y6lpbStxTqkSkt1wwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:22.075218 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:50556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-4pqj1wV0Si-Okef4PAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:23.362415 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:50566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-41ajLEzk2WiQ-10b8gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:24.569508 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:50580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-5KQpVkWug9HeOt8_dgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:25.862633 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-5dSswJuvopo3lOhorgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:27.084867 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:50588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-59SswJuvopo3lOhorwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:28.334821 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:52646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6NSswJuvopo3lOhosQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:30.655365 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:52650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6pqj1wV0Si-Okef4PgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:31.943349 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:52658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6_9ocpUE4ed4uDz5GAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:34.594146 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:45896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-7qQpVkWug9HeOt8_fwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:39.114334 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:52674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-87ysWC90G-1nBrBNzQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:42.551370 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-9lajLEzk2WiQ-10b-AAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:44.559527 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:60454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg--HjZBu2q05ozVU9jzAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:46.148394 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:49132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg--tSswJuvopo3lOhosgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:48.555453 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:49136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-_LysWC90G-1nBrBNzwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:15.256750 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:49152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_F6TCbgAP5jq5Teg1UAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:21.131236 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:34268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HVajLEzk2WiQ-10cIAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:21.960755 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HVajLEzk2WiQ-10cIQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:34:22.577285 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:48064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HtSswJuvopo3lOhovwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:25.567258 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.244.31:34180] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg_IaTCbgAP5jq5Teg1WQAAAss"]
[Mon Mar 16 14:34:26.150329 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_Ipqj1wV0Si-Okef4SAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:39.944796 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_L_9ocpUE4ed4uDz5LwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:13.857470 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:44750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_UbysWC90G-1nBrBOAQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:35:22.975763 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:51324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_WtSswJuvopo3lOho0gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:45.229950 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:39226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_cZqj1wV0Si-Okef4bQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:35:46.736389 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:36234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_cqQpVkWug9HeOt8_xAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:51.567881 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:51240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_d6QpVkWug9HeOt8_yAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:56.981153 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:51566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_fJqj1wV0Si-Okef4cQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:58.525618 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:51582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_frABkC4fWIHEf8H5DwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:36:02.310531 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:43472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_grABkC4fWIHEf8H5EgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:06.366250 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:42044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_ho6lpbStxTqkSkt14QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:07.961902 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:42060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_h6TCbgAP5jq5Teg1sQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:14.455787 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:51594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_jqQpVkWug9HeOt8_2AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:36:18.411302 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:59790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_knjZBu2q05ozVU9j-gAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:00.459835 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:57036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_vKTCbgAP5jq5Teg1_wAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:01.834075 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:44436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_vVajLEzk2WiQ-10cSQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:03.239874 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:44438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_v6QpVkWug9HeOt8_3wAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:05.475395 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:44452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_wY6lpbStxTqkSkt16QAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:07.365029 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_w46lpbStxTqkSkt16wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:08.779913 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:51814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xLABkC4fWIHEf8H5JQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:08.871303 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.228.16:55460] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg_xLysWC90G-1nBrBOGQAAAZY"]
[Mon Mar 16 14:37:10.034514 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:51824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xrABkC4fWIHEf8H5JgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:10.955201 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:59792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xv9ocpUE4ed4uDz5dgAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:11.426217 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:51830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_x3jZBu2q05ozVU9kBQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:12.452915 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:58558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_yNSswJuvopo3lOho5QAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:12.639887 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:51840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_yNSswJuvopo3lOho5gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:13.888891 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:51844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_ybABkC4fWIHEf8H5JwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:15.123347 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:51852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_y_9ocpUE4ed4uDz5eAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:16.132953 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:58560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zFajLEzk2WiQ-10cTgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:16.600467 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:51864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zJqj1wV0Si-Okef4qQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:17.879143 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:51874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zbABkC4fWIHEf8H5KAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:19.115202 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:51742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_z3jZBu2q05ozVU9kCgAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:21.674929 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_0VajLEzk2WiQ-10cUAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:23.096877 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:51764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_03jZBu2q05ozVU9kDwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:25.688048 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:51766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_1aQpVkWug9HeOt8_5AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:27.314475 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:51772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_1_9ocpUE4ed4uDz5fQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:31.898678 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:37610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_27ABkC4fWIHEf8H5MAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:33.322416 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:37618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_3XjZBu2q05ozVU9kFQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:34.521110 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:37624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_3rysWC90G-1nBrBOIgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:35.856977 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:37628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_37ABkC4fWIHEf8H5MQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:40.570734 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:37644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_5FajLEzk2WiQ-10cWQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:41.915011 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:44074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_5bysWC90G-1nBrBOKAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:45.407087 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:44080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_6bABkC4fWIHEf8H5OAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:45.704301 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:58570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_6aTCbgAP5jq5Teg2IQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:47.983369 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:44086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_66TCbgAP5jq5Teg2JAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:50.465488 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:50926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_7VajLEzk2WiQ-10cXgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:51.807125 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:50938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_7_9ocpUE4ed4uDz5ggAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:54.167434 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:50944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_8v9ocpUE4ed4uDz5hgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:55.512105 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:50956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_8_9ocpUE4ed4uDz5iQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:56.803904 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:50968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_9KTCbgAP5jq5Teg2JwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:02.479692 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:58874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_-qTCbgAP5jq5Teg2MAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:04.916058 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:58876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg__LysWC90G-1nBrBOMQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:07.359787 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:58888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg__6TCbgAP5jq5Teg2MwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:08.701544 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:42724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAAKTCbgAP5jq5Teg2NgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:13.824854 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhABJqj1wV0Si-Okef42QAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:30.030738 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:42746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAFo6lpbStxTqkSkt2BgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:35.031863 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:53230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAG7ysWC90G-1nBrBOOQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:36.903271 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:35818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAHFajLEzk2WiQ-10cigAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:39.631587 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:53242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAH6QpVkWug9HeOt8_-wAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:40.448604 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.243.203:38200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAIFajLEzk2WiQ-10cjgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:43.251761 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:53498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAI46lpbStxTqkSkt2DwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:50.811442 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:57666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAKqQpVkWug9HeOt9ACwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:52.251072 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:44438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhALLysWC90G-1nBrBOQQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:59.443194 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:44450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAM6TCbgAP5jq5Teg2TQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:06.081265 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:33964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAOo6lpbStxTqkSkt2HAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:27.891303 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:52814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhAT3jZBu2q05ozVU9kKAAAAUs"]
[Mon Mar 16 14:39:34.591787 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:53502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAVqQpVkWug9HeOt9APwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:36.974317 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:47608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAWP9ocpUE4ed4uDz5oQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:39:44.335474 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:34428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAX6TCbgAP5jq5Teg2XQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:50.527267 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:34430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAZpqj1wV0Si-Okef5LgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:40:50.447952 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:40160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAov9ocpUE4ed4uDz54wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:05.447877 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:53264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAsXjZBu2q05ozVU9kSAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:41:37.599786 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:58006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA0Zqj1wV0Si-Okef5vQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:38.974386 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:38040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA0tSswJuvopo3lOhpIQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:40.265264 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:38056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA1LysWC90G-1nBrBOdQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:41.828408 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:38066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA1Y6lpbStxTqkSkt2NgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:43.269171 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:38076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA146lpbStxTqkSkt2NwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:44.672685 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:38084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA2I6lpbStxTqkSkt2OgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:45.984650 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:38090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA2XjZBu2q05ozVU9kUAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:47.451977 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA27ABkC4fWIHEf8H5hwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:48.734855 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:56750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA3Jqj1wV0Si-Okef5wAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:50.144006 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:56760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA3lajLEzk2WiQ-10czQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:51.439916 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:56772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA346lpbStxTqkSkt2OwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:55.540694 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:56788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA47ysWC90G-1nBrBOewAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:56.904900 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:56798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA5KQpVkWug9HeOt9AngAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:58.257247 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:41146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA5rABkC4fWIHEf8H5igAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:00.887534 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA6P9ocpUE4ed4uDz6AwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:02.232262 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:41162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA6tSswJuvopo3lOhpLAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:05.507034 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:41174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA7XjZBu2q05ozVU9kVwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:07.974635 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:41178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA71ajLEzk2WiQ-10c0gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:10.524942 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA8VajLEzk2WiQ-10c0wAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:10.531600 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.228.16:33040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhA8Y6lpbStxTqkSkt2TAAAAlA"]
[Mon Mar 16 14:42:12.096166 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:35562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA9KTCbgAP5jq5Teg2vQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:13.365818 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:35568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA9aTCbgAP5jq5Teg2wAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:19.515116 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:35570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA-7ysWC90G-1nBrBOgQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:29.627399 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:60730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBBaQpVkWug9HeOt9AqwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:32.085089 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:52552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBCKQpVkWug9HeOt9ArgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:42.373565 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:52562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBEnjZBu2q05ozVU9kawAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:42:59.416018 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:38178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBI3jZBu2q05ozVU9kfQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:43:21.919199 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:53162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBOZqj1wV0Si-Okef54gAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:43:26.604284 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:49336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBPrysWC90G-1nBrBOkwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:43:29.014049 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:49350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBQaTCbgAP5jq5Teg2_AAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:44:08.771191 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:44294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBaNSswJuvopo3lOhpbAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:44:10.185394 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:40694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBaqTCbgAP5jq5Teg3CAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:21.862673 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:40708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBsaTCbgAP5jq5Teg3UwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:45:34.657616 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:59974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBvrysWC90G-1nBrBOuAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:35.971845 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:34916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBv46lpbStxTqkSkt2ugAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:39.847901 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:34924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBw6QpVkWug9HeOt9A2wAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:41.554882 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:53878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBxaQpVkWug9HeOt9A3QAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:46:53.157120 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:53892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCDbysWC90G-1nBrBO_wAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:47:09.907486 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.228.16:37304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhCHXjZBu2q05ozVU9lPQAAAUo"]
[Mon Mar 16 14:47:23.810407 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:39090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCK_9ocpUE4ed4uDz6ZwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:47:31.352491 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:51646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCM6TCbgAP5jq5Teg3fwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:18.091094 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:42176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCnf9ocpUE4ed4uDz6zAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:49:29.264280 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.244.31:48140] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhCqKTCbgAP5jq5Teg3kQAAAs8"]
[Mon Mar 16 14:49:29.278861 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:58202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCp7ABkC4fWIHEf8H6uAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:31.851104 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:56692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCq7ABkC4fWIHEf8H6vgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:49:40.093803 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:56702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCtLABkC4fWIHEf8H6ywAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:47.961566 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:36138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCu9SswJuvopo3lOhpzQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:07.624062 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:35206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCz6QpVkWug9HeOt9BbAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:09.015297 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:44546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC0f9ocpUE4ed4uDz61gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:10.362888 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:44562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC0tSswJuvopo3lOhp1QAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:12.910911 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:44568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC1HjZBu2q05ozVU9lcgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:15.360976 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:60988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC16TCbgAP5jq5Teg3tgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:50:15.466372 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:44576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC146lpbStxTqkSkt2_gAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:16.774264 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:44588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC2P9ocpUE4ed4uDz62AAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:19.098746 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC2_9ocpUE4ed4uDz63AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:21.631104 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:36406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC3aQpVkWug9HeOt9BdQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:24.894849 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:36412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC4NSswJuvopo3lOhp2gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:26.252325 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:36422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC4qQpVkWug9HeOt9BdwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:30.799534 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:36436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC5o6lpbStxTqkSkt3DAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:34.689087 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:57880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC6rABkC4fWIHEf8H66QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:35.953240 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:57882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC65qj1wV0Si-Okef6SgAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:38.393474 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:57894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC7rysWC90G-1nBrBPqAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:39.763610 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:50280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC73jZBu2q05ozVU9liQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:41.150689 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8bysWC90G-1nBrBPqwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:42.515537 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:57772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8lajLEzk2WiQ-10dRAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:43.058514 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:51420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC86QpVkWug9HeOt9BfQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:43.784364 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8_9ocpUE4ed4uDz64gAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:44.420695 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:51424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9KTCbgAP5jq5Teg3vAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:45.194666 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:57788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9aTCbgAP5jq5Teg3vgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:45.791439 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:51438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9aTCbgAP5jq5Teg3vwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:46.635574 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:57794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9lajLEzk2WiQ-10dRgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:47.263472 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:51454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC95qj1wV0Si-Okef6TQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:47.999380 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:57804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC99SswJuvopo3lOhp4gAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:49.483042 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:57806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-bABkC4fWIHEf8H67gAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:49.691658 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:38160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-Zqj1wV0Si-Okef6UAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:50.911084 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-pqj1wV0Si-Okef6UgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:51.095492 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-5qj1wV0Si-Okef6UwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:52.299367 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:41706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_KQpVkWug9HeOt9BhwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:52.319489 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:38172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_KQpVkWug9HeOt9BiAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:53.653520 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:41720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_aQpVkWug9HeOt9BigAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:53.764273 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:38180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_aQpVkWug9HeOt9BiwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:54.954571 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_rysWC90G-1nBrBPtQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:54.990181 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:38186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_v9ocpUE4ed4uDz65wAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:57.382743 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:38194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAHjZBu2q05ozVU9liwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:57.416354 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:41750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAP9ocpUE4ed4uDz66gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:58.928693 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:41762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAlajLEzk2WiQ-10dSAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:58.957564 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:51178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAv9ocpUE4ed4uDz66wAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:00.297506 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:51180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBJqj1wV0Si-Okef6VQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:01.487465 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:37152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBaTCbgAP5jq5Teg3xAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:02.823387 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBrABkC4fWIHEf8H69AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:02.858993 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:51184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBrABkC4fWIHEf8H69QAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:05.530887 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:51192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDCI6lpbStxTqkSkt3GQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:06.713196 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:37176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDClajLEzk2WiQ-10dTAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:10.357622 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:37190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDDrABkC4fWIHEf8H6-AAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:11.812061 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:53128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDD6TCbgAP5jq5Teg3yAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:13.175501 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:53142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDEZqj1wV0Si-Okef6WgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:15.714791 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:53156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDE6QpVkWug9HeOt9BlgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:17.112922 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:53168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDFdSswJuvopo3lOhp7gAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:19.508728 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:53182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDF1ajLEzk2WiQ-10dUgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:21.889380 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:52322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDGaTCbgAP5jq5Teg3zgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:23.382694 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:52338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDG5qj1wV0Si-Okef6YQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:24.778993 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:52344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDHKTCbgAP5jq5Teg30AAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:26.315590 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:52356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDHrysWC90G-1nBrBPzwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:27.635688 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:52366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDH46lpbStxTqkSkt3IAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:29.075402 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:52372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDIY6lpbStxTqkSkt3IwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:30.107252 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:51204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDIv9ocpUE4ed4uDz7BgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:31.367785 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:33072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDI5qj1wV0Si-Okef6ZgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:31.415406 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:58882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDI7ABkC4fWIHEf8H7BAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:33.923434 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:58896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDJaQpVkWug9HeOt9BmQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:35.343365 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:58908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDJ5qj1wV0Si-Okef6ZwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:36.464871 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:58916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKNSswJuvopo3lOhp9QAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:37.223801 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:33074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKbysWC90G-1nBrBP5gAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:37.858346 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:58926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKY6lpbStxTqkSkt3KAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:38.664722 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:33084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKnjZBu2q05ozVU9llAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:39.242455 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDK6QpVkWug9HeOt9BmgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:40.078636 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:33090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLKTCbgAP5jq5Teg32AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:40.635985 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:35560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLKTCbgAP5jq5Teg32QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:41.851549 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:35576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLVajLEzk2WiQ-10dVAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:42.613406 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:39686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLv9ocpUE4ed4uDz7CQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:44.727856 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:39702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMKQpVkWug9HeOt9BnAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:46.953333 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:35586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMaTCbgAP5jq5Teg32wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:46.954761 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMv9ocpUE4ed4uDz7DAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:49.887427 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:45252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDNZqj1wV0Si-Okef6awAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:51.762028 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:45264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDN7ABkC4fWIHEf8H7CAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:53.186126 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:45268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDOXjZBu2q05ozVU9lmAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:54.108235 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:39724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDOqQpVkWug9HeOt9BoQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:55.469661 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:46752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDO6TCbgAP5jq5Teg33QAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:55.699928 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDO9SswJuvopo3lOhp-wAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:57.069626 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:45286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPZqj1wV0Si-Okef6bQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:57.713229 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:46756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPY6lpbStxTqkSkt3MAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:58.663884 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:50400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPrABkC4fWIHEf8H7DQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:59.149916 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:46772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDP9SswJuvopo3lOhp_AAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:00.720495 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.243.203:60232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQFajLEzk2WiQ-10dXQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:01.571645 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:50412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQVajLEzk2WiQ-10dXgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:02.315644 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:60238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQqQpVkWug9HeOt9BowAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:03.153043 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:50416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQ7ABkC4fWIHEf8H7EQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:06.043512 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:60240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDRlajLEzk2WiQ-10dZgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:08.669583 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:60244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDSI6lpbStxTqkSkt3OgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:10.810779 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:35274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhDSnjZBu2q05ozVU9lnQAAAUQ"]
[Mon Mar 16 14:52:12.712131 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:50420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTKTCbgAP5jq5Teg35gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:14.003474 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:60250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTnjZBu2q05ozVU9logAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:14.251895 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:54162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTtSswJuvopo3lOhqAAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:15.663440 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:54172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDT1ajLEzk2WiQ-10daQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:16.887028 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:47740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUJqj1wV0Si-Okef6dwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:17.163928 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:54180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUZqj1wV0Si-Okef6eAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:18.331658 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:47742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUqQpVkWug9HeOt9BrQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:18.427275 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:53828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUqQpVkWug9HeOt9BrgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:19.721608 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:47744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDU7ABkC4fWIHEf8H7FgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:22.336223 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:53830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDVv9ocpUE4ed4uDz7HAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:22.507913 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:48158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDVtSswJuvopo3lOhqBwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:23.871720 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:53846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDV9SswJuvopo3lOhqCAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:23.956306 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:48174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDV_9ocpUE4ed4uDz7HQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:25.159653 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:53860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDWbABkC4fWIHEf8H7GgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:25.343492 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:48180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDWdSswJuvopo3lOhqCwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:28.125953 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:53872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXLABkC4fWIHEf8H7HgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:28.211580 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:48186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXLABkC4fWIHEf8H7HwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:29.519752 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:58174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXdSswJuvopo3lOhqEAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:29.633487 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXf9ocpUE4ed4uDz7HwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:30.863955 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:58180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXv9ocpUE4ed4uDz7IQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:32.209013 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYP9ocpUE4ed4uDz7JQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:33.386376 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:58192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYbABkC4fWIHEf8H7IAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:34.443375 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:42544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYv9ocpUE4ed4uDz7KQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:34.759346 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:58198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYrABkC4fWIHEf8H7IQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:35.823040 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:42550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDY1ajLEzk2WiQ-10dbQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:44.512586 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:42564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDbI6lpbStxTqkSkt3TAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:48.104379 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDcLABkC4fWIHEf8H7LAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:49.535087 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDcVajLEzk2WiQ-10dcQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:50.763682 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:33292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDctSswJuvopo3lOhqFwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:53.279801 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:33302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDddSswJuvopo3lOhqGgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:54.633916 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:33314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDdlajLEzk2WiQ-10dcgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:55.020047 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:58214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDd6TCbgAP5jq5Teg3_AAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:52:55.905742 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:33328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDd5qj1wV0Si-Okef6ggAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:57.272033 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:33332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDedSswJuvopo3lOhqGwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:04.249497 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:33336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgP9ocpUE4ed4uDz7MwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:05.607406 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:48422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgXjZBu2q05ozVU9lrwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:06.949753 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:48434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgv9ocpUE4ed4uDz7OQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:08.299989 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:48444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDhKTCbgAP5jq5Teg4CwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:09.674816 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:48460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDhVajLEzk2WiQ-10deAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:11.011543 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:46476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDh3jZBu2q05ozVU9lsAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:14.919742 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:46488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDitSswJuvopo3lOhqIwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:16.294995 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:46494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjNSswJuvopo3lOhqJQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:17.701700 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:46502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjaQpVkWug9HeOt9BzwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:18.923661 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:46512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjqTCbgAP5jq5Teg4DQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:20.136408 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:47462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkNSswJuvopo3lOhqKAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:21.463547 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:47466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkXjZBu2q05ozVU9luAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:22.915053 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:47482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkqQpVkWug9HeOt9B1AAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:25.255593 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDlXjZBu2q05ozVU9luwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:30.860119 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDmaTCbgAP5jq5Teg4FwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:34.735427 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:45704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDnpqj1wV0Si-Okef6pgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:35.772846 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:42014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDn7ysWC90G-1nBrBQIAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:40.715631 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:42024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDpLABkC4fWIHEf8H7TgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:48.091865 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:43082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDqrysWC90G-1nBrBQJwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:49.318785 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:38522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDrdSswJuvopo3lOhqOgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:50.971319 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:55696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDrnjZBu2q05ozVU9lxAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:52.251190 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:55698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDsKQpVkWug9HeOt9B2gAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:55.385131 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:43084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDso6lpbStxTqkSkt3hwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:58.268191 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:49160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDtnjZBu2q05ozVU9lxwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:54:01.271023 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:49176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDt6TCbgAP5jq5Teg4HwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:54:10.179379 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:48164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDwlajLEzk2WiQ-10djgAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:54:10.279175 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:55704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDwrysWC90G-1nBrBQNwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:54:15.583242 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:36356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDx3jZBu2q05ozVU9lzwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:55:22.590880 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.244.31:59138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhECqQpVkWug9HeOt9B7QAAA1E"]
[Mon Mar 16 14:57:19.251535 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:33130] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhEf3jZBu2q05ozVU9l-QAAAVM"]
[Mon Mar 16 15:01:11.811161 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.244.31:55322] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhFZ6TCbgAP5jq5Teg43QAAAsQ"]
[Mon Mar 16 15:02:40.802709 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.228.16:58540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhFwI6lpbStxTqkSkt4FgAAAk8"]
[Mon Mar 16 15:06:33.471119 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.244.31:59296] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhGqVajLEzk2WiQ-10eNgAAApM"]
[Mon Mar 16 15:07:58.651303 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:60282] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhG_njZBu2q05ozVU9mhwAAAU0"]
[Mon Mar 16 15:11:34.185352 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:45372] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhH1njZBu2q05ozVU9mswAAAUs"]
[Mon Mar 16 15:16:57.776390 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.244.31:60134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhJGLABkC4fWIHEf8H8lwAAAEQ"]
[Mon Mar 16 15:23:29.640187 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.228.16:36904] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhKoUr9dMAiw-8KANNSsQAAAQ8"]
[Mon Mar 16 15:27:25.378407 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.244.31:37938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhLjUr9dMAiw-8KANNS3QAAARI"]
[Mon Mar 16 15:27:30.606337 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.228.16:52172] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhLklajLEzk2WiQ-10fugAAAos"]
[Mon Mar 16 15:32:26.768956 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.244.31:39518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhMulajLEzk2WiQ-10f9AAAAoc"]
[Mon Mar 16 15:34:04.181888 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.228.16:50000] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhNHKQpVkWug9HeOt9DwwAAA1g"]
[Mon Mar 16 15:37:48.083037 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.244.31:50930] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhN_KTCbgAP5jq5Teg6fwAAAsw"]
[Mon Mar 16 15:39:25.764700 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.228.16:36384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhOXf9ocpUE4ed4uDz-GgAAAg8"]
[Mon Mar 16 15:43:01.656896 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.244.31:44474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhPNaTCbgAP5jq5Teg7BgAAAsU"]
[Mon Mar 16 15:44:00.158872 2026] [access_compat:error] [pid 15568:tid 140411574073088] [client 141.98.11.23:59724] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Mon Mar 16 15:44:08.111255 2026] [access_compat:error] [pid 29802:tid 140411548894976] [client 141.98.11.23:60875] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Mon Mar 16 15:44:34.318096 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.228.16:59348] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhPklajLEzk2WiQ-10gkAAAApY"]
[Mon Mar 16 15:49:39.846800 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:37076] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhQw9SswJuvopo3lOhtnAAAAII"]
[Mon Mar 16 15:50:40.292285 2026] [access_compat:error] [pid 15061:tid 140411691570944] [client 200.107.116.178:32389] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 15:52:17.365020 2026] [access_compat:error] [pid 14895:tid 140411674785536] [client 186.247.17.110:60835] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 15:52:56.220430 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.228.16:41462] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhRiNSswJuvopo3lOht9wAAAJc"]
[Mon Mar 16 15:53:39.842716 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.244.31:51048] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhRs8_BxrYCr4hPDw_6HQAAAc4"]
[Mon Mar 16 15:58:59.995931 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.244.31:55994] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhS88_BxrYCr4hPDw_6cgAAAdA"]
[Mon Mar 16 16:00:40.319602 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.228.16:56456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhTWKTCbgAP5jq5Teg8mwAAAtE"]
[Mon Mar 16 16:04:09.557604 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.244.31:33932] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhUKc_BxrYCr4hPDw_7DAAAAcU"]
[Mon Mar 16 16:05:51.925655 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.228.16:47800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhUj1ajLEzk2WiQ-10i5wAAApc"]
[Mon Mar 16 16:09:21.308937 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.244.31:49816] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhVYaQpVkWug9HeOt9GtAAAA0Q"]
[Mon Mar 16 16:11:15.052097 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:47222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhV01ajLEzk2WiQ-10jJgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:11:16.648186 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.228.16:34932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhV1Er9dMAiw-8KANNW3QAAAQY"]
[Mon Mar 16 16:11:36.231077 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:46312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhV6KTCbgAP5jq5Teg9GwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:12:14.571220 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:52868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhWDv9ocpUE4ed4uDwCdAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:13:11.091987 2026] [access_compat:error] [pid 15568:tid 140411716749056] [client 45.94.31.197:33836] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 16:14:37.310943 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.244.31:50958] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhWnaQpVkWug9HeOt9G6gAAA1g"]
[Mon Mar 16 16:16:59.994431 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:50352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXK1ajLEzk2WiQ-10jVwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:05.873785 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:50354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXMVajLEzk2WiQ-10jWQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:11.931853 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXN1ajLEzk2WiQ-10jWwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:18.428048 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:45664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXPo6lpbStxTqkSkt8UgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:24.502650 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:45678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXRKTCbgAP5jq5Teg9WQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:30.617645 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:37204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXSlajLEzk2WiQ-10jZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:36.548559 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:37216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXUP9ocpUE4ed4uDwDNQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:42.710189 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:49886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXVs_BxrYCr4hPDw_7kQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:48.826317 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:42508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXXLysWC90G-1nBrBUuwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:55.210780 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:42522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXY6TCbgAP5jq5Teg9YAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:01.124533 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:52380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXadSswJuvopo3lOhv2wAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:07.490994 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:52392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXb7ABkC4fWIHEf8ECUAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:13.707117 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:44110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXdbysWC90G-1nBrBUvwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:19.736434 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:51902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXe7ABkC4fWIHEf8ECUwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:25.650965 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:51906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXgaQpVkWug9HeOt9HYQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:33.339009 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:56420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXiLABkC4fWIHEf8ECWAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:38.024728 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:56424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXjv9ocpUE4ed4uDwDRgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:44.410275 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:59742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXlNSswJuvopo3lOhv5QAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:50.903889 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:44366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXmv9ocpUE4ed4uDwDSgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:08.892109 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:45968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXrP9ocpUE4ed4uDwDTgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:21.074754 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:38136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXubysWC90G-1nBrBU8gAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:24.580640 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:43984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXvLysWC90G-1nBrBU-AAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:27.810596 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:43998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXvf9ocpUE4ed4uDwDVQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:35.836510 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:44004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXx_9ocpUE4ed4uDwDZAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:19:39.322463 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:58534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXy_9ocpUE4ed4uDwDZwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:39.662053 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:38086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhXy7ABkC4fWIHEf8ECagAAAFg"]
[Mon Mar 16 16:19:42.744654 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:43112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXzrysWC90G-1nBrBU-wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:59.729125 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:43122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhX36QpVkWug9HeOt9HhgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:03.826139 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:41140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhX49SswJuvopo3lOhv9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:33.246621 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYAaTCbgAP5jq5Teg9jQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:39.949694 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:45090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYB46lpbStxTqkSkt8fAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:44.428737 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:60534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYDLysWC90G-1nBrBVBQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:45.739444 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:60546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYDc_BxrYCr4hPDw_8DAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:49.261027 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:60562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYEY6lpbStxTqkSkt8fgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:08.340183 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:33076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYJLABkC4fWIHEf8ECxgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:09.646133 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:35590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYJVajLEzk2WiQ-10jjwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:14.015894 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:45974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYKs_BxrYCr4hPDw_8JAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:15.331704 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:34526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYK7ysWC90G-1nBrBVCAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:21:44.795549 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:34538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYSP9ocpUE4ed4uDwDkgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:22:00.024580 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:54218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYWEr9dMAiw-8KANNXlwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:10.182149 2026] [mime_magic:error] [pid 15568:tid 140411624429312] (70014)End of file found: [client 74.7.243.203:50216] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/include/bits
[Mon Mar 16 16:23:14.879571 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:51522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYoqTCbgAP5jq5Teg9rgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:16.465560 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:51528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYpNSswJuvopo3lOhwbQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:40.891844 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:59254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYvFajLEzk2WiQ-10kDgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:46.446968 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:51530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYwrysWC90G-1nBrBVgQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:47.808546 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYw6QpVkWug9HeOt9HoAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:50.286275 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:52266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYxaTCbgAP5jq5Teg9swAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:56.089117 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:55764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzKTCbgAP5jq5Teg9uwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:57.403480 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:55768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzbysWC90G-1nBrBVjQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:58.689180 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:55784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzrysWC90G-1nBrBVkAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:21.155156 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:55792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY5Y6lpbStxTqkSkt8qQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:22.409403 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:35928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY5rABkC4fWIHEf8EDQAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:23.739150 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:35932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY58_BxrYCr4hPDw_8PwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:24.944048 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:35944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY6KQpVkWug9HeOt9HpQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:26.259341 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:35946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY6tSswJuvopo3lOhwgAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:27.415770 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:35962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY60r9dMAiw-8KANNXqAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:28.623096 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:35972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY7NSswJuvopo3lOhwgQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:29.950990 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY7bABkC4fWIHEf8EDUgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:31.271341 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:44028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY76TCbgAP5jq5Teg9xQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:32.503047 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:44038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8KTCbgAP5jq5Teg9xgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:33.723543 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:44042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8bABkC4fWIHEf8EDWQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:34.987292 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:44058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8qTCbgAP5jq5Teg9xwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:36.150494 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:44068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9KQpVkWug9HeOt9HqAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:37.338188 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:44076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9aTCbgAP5jq5Teg9yQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:39.641887 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:44084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9qQpVkWug9HeOt9HqQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:43.459432 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:51122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY-7ABkC4fWIHEf8EDbwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:47.021467 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY_8_BxrYCr4hPDw_8RgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:02.620844 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:51134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZDlajLEzk2WiQ-10kJAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:04.984853 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:57520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZEM_BxrYCr4hPDw_8SgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:41.530813 2026] [access_compat:error] [pid 29802:tid 140411658000128] [client 142.248.80.157:56127] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Mon Mar 16 16:25:44.018142 2026] [access_compat:error] [pid 29802:tid 140411691570944] [client 142.248.80.157:56127] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Mon Mar 16 16:25:55.097663 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:53740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZQ0r9dMAiw-8KANNX7QAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:25:57.568517 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:36658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZRf9ocpUE4ed4uDwDxQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:20.853503 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:56864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhZXLABkC4fWIHEf8EELgAAAEs"]
[Mon Mar 16 16:26:45.183699 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:33962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZdbABkC4fWIHEf8EEWAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:48.684020 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:47016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZeLABkC4fWIHEf8EEXQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:49.951609 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:55138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZedSswJuvopo3lOhwjgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:52.154831 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:55148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZfI6lpbStxTqkSkt8wAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:57.164424 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:55158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZgaQpVkWug9HeOt9HxQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:10.302455 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:53978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZjY6lpbStxTqkSkt8zQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:11.706235 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:44130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZj7ABkC4fWIHEf8EEeQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:12.871650 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:44142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZkLABkC4fWIHEf8EEfAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:19.260912 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:44146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZl_9ocpUE4ed4uDwD1QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:20.612714 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZmP9ocpUE4ed4uDwD1gAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:21.897010 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZmaQpVkWug9HeOt9HygAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:23.242343 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:41442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZm9SswJuvopo3lOhwjwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:24.487804 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:41446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZnLysWC90G-1nBrBVqwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:25.672868 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:41458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZnUr9dMAiw-8KANNYPwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:29.055913 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:41464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZoY6lpbStxTqkSkt81AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:30.397551 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:36224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZoqQpVkWug9HeOt9HywAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:33.034981 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:36238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZpUr9dMAiw-8KANNYQQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:34.535286 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:36254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZpv9ocpUE4ed4uDwD1wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:35.865013 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:36256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZp1ajLEzk2WiQ-10kUAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:38.279426 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:36268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZqdSswJuvopo3lOhwkgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:39.774979 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:54036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZq8_BxrYCr4hPDw_8cgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:41.215329 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:54048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZrf9ocpUE4ed4uDwD2gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:45.132606 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:54062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZsaTCbgAP5jq5Teg92QAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:47.867167 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:54066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZs6QpVkWug9HeOt9H0AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:53.094615 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:37000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZubysWC90G-1nBrBVswAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:54.480029 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:37002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZuqTCbgAP5jq5Teg92gAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:28:36.242324 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:37010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5Er9dMAiw-8KANNYawAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:37.606076 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:53410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5bABkC4fWIHEf8EFEAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:38.863779 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:33522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5rABkC4fWIHEf8EFFQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:40.219069 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:33530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ6LABkC4fWIHEf8EFGQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:41.401865 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:33542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ6Ur9dMAiw-8KANNYbAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:44.839385 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:33548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ7KQpVkWug9HeOt9H2gAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:46.126968 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:33564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ7rysWC90G-1nBrBVugAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:47.444072 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:33576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ78_BxrYCr4hPDw_8fgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:48.615322 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:60394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ8KQpVkWug9HeOt9H2wAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:49.986686 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:60404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ8Ur9dMAiw-8KANNYbQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:51.181011 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:60408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ86TCbgAP5jq5Teg94AAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:53.523602 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:60414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ9f9ocpUE4ed4uDwD6QAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:54.821382 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:60430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ9s_BxrYCr4hPDw_8fwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:55.954955 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:60434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ90r9dMAiw-8KANNYbgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:59.370807 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:60440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ-46lpbStxTqkSkt84QAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:00.696905 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:47212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ_LysWC90G-1nBrBVvwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:02.970434 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:47222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ_lajLEzk2WiQ-10kXgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:05.367980 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:47232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaAUr9dMAiw-8KANNYcQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:07.687131 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:47242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaAv9ocpUE4ed4uDwD7gAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:09.090326 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaBaTCbgAP5jq5Teg94gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:10.303715 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:57380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaBo6lpbStxTqkSkt84gAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:18.378601 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:57390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaDkr9dMAiw-8KANNYfAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:19.810465 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:60014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaD_9ocpUE4ed4uDwEAgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:21.019155 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:60018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaEc_BxrYCr4hPDw_8gwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:22.365538 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:60030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaEv9ocpUE4ed4uDwEBgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:23.548335 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:60044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaE6TCbgAP5jq5Teg94wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:26.968055 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:60058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaFv9ocpUE4ed4uDwEDgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:29.367459 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:45748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaGf9ocpUE4ed4uDwEEwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:35.130423 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:45756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaHf9ocpUE4ed4uDwEGwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:40.172135 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:45772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJKTCbgAP5jq5Teg95wAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:41.512422 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:51492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJbysWC90G-1nBrBVwwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:41.735845 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.244.31:56642] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhaJY6lpbStxTqkSkt85QAAAkE"]
[Mon Mar 16 16:29:43.505158 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:51502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJtSswJuvopo3lOhwyAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:45.964347 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:51510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaKdSswJuvopo3lOhwzQAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:47.903372 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:51520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaK1ajLEzk2WiQ-10kZAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:54.685776 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:60638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaMlajLEzk2WiQ-10kagAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:03.546089 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:60646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaO7ysWC90G-1nBrBVyQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:05.133100 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:50094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaPf9ocpUE4ed4uDwENwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:10.471482 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:58674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaQrysWC90G-1nBrBVzwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:23.369450 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:50440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaT1ajLEzk2WiQ-10kdwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:31:20.858742 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:50372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaiM_BxrYCr4hPDw_80gAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:21.035104 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.228.16:52960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhaiUr9dMAiw-8KANNYiwAAAQs"]
[Mon Mar 16 16:31:23.349838 2026] [mime_magic:error] [pid 14895:tid 140411683178240] (70014)End of file found: [client 74.7.243.203:38744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Mon Mar 16 16:31:24.241830 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.243.203:38748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhajM_BxrYCr4hPDw_80wAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:27.001604 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:38762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaj8_BxrYCr4hPDw_81wAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:29.864209 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:38772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhakaTCbgAP5jq5Teg-DgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:31.597776 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:37906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhak9SswJuvopo3lOhxEQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:32.729384 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:37914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhalKTCbgAP5jq5Teg-EgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:35.264800 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:37916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhal7ABkC4fWIHEf8EFYgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:37.849337 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:37930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhamaQpVkWug9HeOt9H_QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:39.259276 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:37942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abham6QpVkWug9HeOt9H_gAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:40.623950 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:57948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhanP9ocpUE4ed4uDwEUgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:45.047697 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:57958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaobysWC90G-1nBrBV4QAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:47.431110 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhao6QpVkWug9HeOt9IBAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:50.184522 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:57986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhapdSswJuvopo3lOhxFgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:52.648501 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:34824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaqLysWC90G-1nBrBV4wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:55.015099 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:34838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaq0r9dMAiw-8KANNYlQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:56.371825 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:34840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abharEr9dMAiw-8KANNYlwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:00.903295 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:34852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhasM_BxrYCr4hPDw_84wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:02.262602 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:47710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhasv9ocpUE4ed4uDwEWgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:03.471255 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:47712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhas9SswJuvopo3lOhxGQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:04.791406 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:47720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhatNSswJuvopo3lOhxGgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:09.522889 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:47728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhauP9ocpUE4ed4uDwEXgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:11.964340 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:45694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhau7ABkC4fWIHEf8EFbgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:14.260118 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:49806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhavlajLEzk2WiQ-10k6AAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:16.589240 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:45700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhawLysWC90G-1nBrBV6gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:17.919821 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:51196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhawY6lpbStxTqkSkt9CQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:19.022281 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.243.203:45702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaw0r9dMAiw-8KANNYmgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:29.455712 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhazdSswJuvopo3lOhxJQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:31.802404 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaz9SswJuvopo3lOhxJwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:32.403456 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha0KQpVkWug9HeOt9IFQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:36.246552 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:53374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha1KTCbgAP5jq5Teg-UAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:38.619789 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:53382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha1kr9dMAiw-8KANNYogAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:39.936223 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:53388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha17ysWC90G-1nBrBV7gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:41.440502 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:35210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha2Ur9dMAiw-8KANNYpAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:42.700787 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:35226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha2kr9dMAiw-8KANNYpgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:43.927575 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:35236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha29SswJuvopo3lOhxKQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:45.110000 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:35248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3dSswJuvopo3lOhxKwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:46.451089 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.243.203:35258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3lajLEzk2WiQ-10k6wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:47.747784 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:39480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3_9ocpUE4ed4uDwEcwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:51.943238 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:35262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha48_BxrYCr4hPDw_88QAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:53.370845 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:36670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5f9ocpUE4ed4uDwEdQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:54.403464 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:36020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5lajLEzk2WiQ-10k8gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:54.580953 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:36684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5kr9dMAiw-8KANNYqwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:55.919967 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:36692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha59SswJuvopo3lOhxLwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:56.796856 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha6FajLEzk2WiQ-10k9AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:58.222297 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:36700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha6v9ocpUE4ed4uDwEeQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:59.540366 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:36710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha67ABkC4fWIHEf8EFewAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:00.687405 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:55260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha7M_BxrYCr4hPDw_89AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:02.366750 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:55274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha7Ur9dMAiw-8KANNYrgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:03.851998 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:55282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha71ajLEzk2WiQ-10k9wAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:05.219044 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:55286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha8Y6lpbStxTqkSkt9GAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:07.828806 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:55290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha8qQpVkWug9HeOt9IHAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:09.193506 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:55306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha9Ur9dMAiw-8KANNYsQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:11.603011 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:54208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha98_BxrYCr4hPDw_8-gAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:12.918133 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:54210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha-LABkC4fWIHEf8EFgAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:15.585855 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:54214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha-rysWC90G-1nBrBV_AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:16.890946 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:54216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_M_BxrYCr4hPDw_8_QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:18.134247 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:54232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_qTCbgAP5jq5Teg-egAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:19.525415 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:54248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_6TCbgAP5jq5Teg-fwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:20.720412 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:50340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbAP9ocpUE4ed4uDwEiAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:22.029122 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:50344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbAo6lpbStxTqkSkt9HgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:26.166282 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:50350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbBqQpVkWug9HeOt9IKQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:27.263668 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:56174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbB9SswJuvopo3lOhxTQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:27.463520 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:50366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbB6TCbgAP5jq5Teg-hAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:28.934161 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:50372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbCI6lpbStxTqkSkt9IQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:40.434615 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbFLysWC90G-1nBrBWEgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:42.875683 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:56462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbFtSswJuvopo3lOhxVQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:47.471534 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbG8_BxrYCr4hPDw_9FwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:52.999170 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:51764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbIKQpVkWug9HeOt9IOAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:08.483530 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:51774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbMEr9dMAiw-8KANNY0wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:09.845089 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:60212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbMf9ocpUE4ed4uDwEmwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:13.106183 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:60228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbNf9ocpUE4ed4uDwEnwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:14.402727 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:60244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbNqTCbgAP5jq5Teg-lAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:15.529924 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:60248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbN_9ocpUE4ed4uDwEowAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:16.856975 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:60254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbONSswJuvopo3lOhxewAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:20.003126 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:60260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPM_BxrYCr4hPDw_9JQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:20.201245 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:56476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPNSswJuvopo3lOhxfwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:34:22.391653 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:37918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPv9ocpUE4ed4uDwEpwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:22.623838 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPo6lpbStxTqkSkt9NAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:24.799190 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:37924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbQLABkC4fWIHEf8EFowAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:26.089079 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:37934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbQv9ocpUE4ed4uDwEqwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:28.803008 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:37942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbRKTCbgAP5jq5Teg-mQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:30.164425 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:42668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbRv9ocpUE4ed4uDwErAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:31.306030 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:42682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbR7ABkC4fWIHEf8EFqAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:32.591652 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbSI6lpbStxTqkSkt9NwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:35.144020 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:42708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbSUr9dMAiw-8KANNY4wAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:36.442521 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:42722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTLABkC4fWIHEf8EFqgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:37.628223 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTc_BxrYCr4hPDw_9JwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:38.903515 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:37320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTqTCbgAP5jq5Teg-mwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:40.076208 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:37328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbUM_BxrYCr4hPDw_9KAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:41.348140 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:37338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbUaQpVkWug9HeOt9IRAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:42.025809 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.244.31:49318] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhbUrysWC90G-1nBrBWKAAAAYE"]
[Mon Mar 16 16:34:43.588943 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:37352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbU7ABkC4fWIHEf8EFrgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:44.925436 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:37356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbVKQpVkWug9HeOt9IRgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:48.230829 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:37360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWM_BxrYCr4hPDw_9LAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:49.528352 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:38532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWdSswJuvopo3lOhxigAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:50.730401 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:38536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWo6lpbStxTqkSkt9PQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:52.015918 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:38546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXP9ocpUE4ed4uDwEtAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:53.211102 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:38558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXdSswJuvopo3lOhxjAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:54.548197 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:38564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXrABkC4fWIHEf8EFtQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:55.716691 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:38566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbX_9ocpUE4ed4uDwEtgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:58.092450 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:38576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbYf9ocpUE4ed4uDwEuAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:59.478606 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:55718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbY8_BxrYCr4hPDw_9MQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:04.396528 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:55734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbaLysWC90G-1nBrBWMQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:06.470859 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:55748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbaY6lpbStxTqkSkt9QAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:07.825535 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhba7ysWC90G-1nBrBWMgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:08.971188 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:34786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbbI6lpbStxTqkSkt9QgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:10.299451 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:34794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbbqTCbgAP5jq5Teg-pwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:11.511582 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbb7ABkC4fWIHEf8EFwwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:12.828909 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:36328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbcEr9dMAiw-8KANNZCgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:13.767660 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:34802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbcc_BxrYCr4hPDw_9NQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:14.215684 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbctSswJuvopo3lOhxkwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:15.435074 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:39792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbc9SswJuvopo3lOhxlQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:16.153037 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:34808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbdFajLEzk2WiQ-10laAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:18.214216 2026] [access_compat:error] [pid 15061:tid 140411599251200] [client 142.248.80.157:62967] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Mon Mar 16 16:35:19.682909 2026] [access_compat:error] [pid 15061:tid 140411658000128] [client 142.248.80.157:62967] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Mon Mar 16 16:35:19.775185 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:34816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbd_9ocpUE4ed4uDwEwQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:25.671831 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbfbABkC4fWIHEf8EF0gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:28.107633 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:45586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbgKTCbgAP5jq5Teg-twAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:33.819485 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:45602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbhc_BxrYCr4hPDw_9PwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:35:35.642883 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:42828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbh_9ocpUE4ed4uDwExAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:58.925037 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:42840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbno6lpbStxTqkSkt9XQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:58.929811 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:53074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbnlajLEzk2WiQ-10loAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:00.334640 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:47682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhboLysWC90G-1nBrBWRQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:01.620647 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:47696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhboaQpVkWug9HeOt9IVAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:03.520208 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:54330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbo7ysWC90G-1nBrBWSwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:05.080625 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:47712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbpaQpVkWug9HeOt9IXAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:07.218578 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:54342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbp6QpVkWug9HeOt9IXwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:36:07.505310 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:47724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbp6TCbgAP5jq5Teg-0gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:12.361609 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbrKQpVkWug9HeOt9IbQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:13.675123 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:56724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbraQpVkWug9HeOt9IcAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:14.925154 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.243.203:56736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbrs_BxrYCr4hPDw_9RgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:16.081785 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:56750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbsLysWC90G-1nBrBWTQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:17.258448 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:56766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbsUr9dMAiw-8KANNZFgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:18.546968 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:56778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbss_BxrYCr4hPDw_9RwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:21.913512 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:58932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbtaQpVkWug9HeOt9IdwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:21.968130 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:56790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbtdSswJuvopo3lOhxqQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:23.152211 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.228.16:58604] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhbt_9ocpUE4ed4uDwE3AAAAhU"]
[Mon Mar 16 16:36:23.236249 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:58542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbt8_BxrYCr4hPDw_9SQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:26.611791 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbuv9ocpUE4ed4uDwE4gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:28.025104 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:58562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvKTCbgAP5jq5Teg-6gAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:29.350987 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:58576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvf9ocpUE4ed4uDwE5QAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:30.527573 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:42722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvqQpVkWug9HeOt9IfgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:31.844390 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:42734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbv6QpVkWug9HeOt9IfwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:35.217384 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:42740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbw6TCbgAP5jq5Teg-_QAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:38.678698 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:42756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbxlajLEzk2WiQ-10lrQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:40.003615 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:42770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbyFajLEzk2WiQ-10lrwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:41.231551 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:36618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbyf9ocpUE4ed4uDwE7AAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:42.446076 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:36634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbylajLEzk2WiQ-10lsAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:43.620736 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:36640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhby_9ocpUE4ed4uDwE7gAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:46.035591 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:36652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbzrysWC90G-1nBrBWVgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:47.379060 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:36664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbz6QpVkWug9HeOt9IgQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:48.791129 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb0LysWC90G-1nBrBWWAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:52.563108 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:36686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb1KTCbgAP5jq5Teg_HQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:53.881368 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:33102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb1aQpVkWug9HeOt9IgwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:55.079967 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb146lpbStxTqkSkt9YQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:57.429461 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb2f9ocpUE4ed4uDwE9wAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:04.412659 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:33142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb4KQpVkWug9HeOt9IjAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:05.728039 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:40142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb4Y6lpbStxTqkSkt9ZwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:08.279484 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:40146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb5P9ocpUE4ed4uDwFAwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:13.871490 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb6f9ocpUE4ed4uDwFCgAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:18.508255 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:58776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb7s_BxrYCr4hPDw_9UwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:33.873462 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:49744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb_aTCbgAP5jq5Teg_YgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 16:37:37.354500 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:49668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcAY6lpbStxTqkSkt9dAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:38:05.817696 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:58790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcHf9ocpUE4ed4uDwFVwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:11.853850 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:55424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcI46lpbStxTqkSkt9fQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:13.173157 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:40356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcJaTCbgAP5jq5Teg_dwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:16.574329 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:40358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcKKQpVkWug9HeOt9IlwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:38:19.283472 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:51926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcK1ajLEzk2WiQ-10mDAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:22.739869 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:52406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcLs_BxrYCr4hPDw_9bwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:39.347273 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:40374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcP6TCbgAP5jq5Teg_mgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:41.520306 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:49394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcQNSswJuvopo3lOhx4QAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:38:53.453038 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:52416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcTY6lpbStxTqkSkt9qQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:00.163869 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:38828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVP9ocpUE4ed4uDwFdAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:00.230544 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:49404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVI6lpbStxTqkSkt9rwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:01.478726 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:53480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVdSswJuvopo3lOhx5QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:02.640112 2026] [access_compat:error] [pid 29507:tid 140411616036608] [client 136.117.173.182:55024] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 16:39:03.835544 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:51064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcV6QpVkWug9HeOt9InQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:08.304425 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:51068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcXNSswJuvopo3lOhx7wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:16.294129 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:53486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcZM_BxrYCr4hPDw_9hAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:18.992070 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:33810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcZqTCbgAP5jq5Teg_nwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:28.670598 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:51084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhccEr9dMAiw-8KANNZVwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:31.163385 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:39706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcc_9ocpUE4ed4uDwFegAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:32.434460 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:38984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcdFajLEzk2WiQ-10mNAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:34.744434 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:38994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcdo6lpbStxTqkSkt9tAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:36.066763 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:38996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhceLABkC4fWIHEf8EGJgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:43.338462 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.244.31:40138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhcf46lpbStxTqkSkt9tgAAAkc"]
[Mon Mar 16 16:39:45.096811 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:39004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcgc_BxrYCr4hPDw_9jwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:47.419135 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:41518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcg_9ocpUE4ed4uDwFhgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:48.709943 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:41530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhchKQpVkWug9HeOt9IrgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:53.523916 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:41536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcibABkC4fWIHEf8EGKgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:58.602775 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:59286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcjVajLEzk2WiQ-10mQwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:59.921857 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:59300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcj6QpVkWug9HeOt9IswAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:40:06.451175 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:46434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhclqTCbgAP5jq5Teg_2QAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:40:06.522207 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:57486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhclo6lpbStxTqkSkt9wgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:40:13.325458 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:57488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcnbABkC4fWIHEf8EGNQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:23.201700 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.228.16:41354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhc46TCbgAP5jq5Teg_8gAAAss"]
[Mon Mar 16 16:41:27.145875 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:34292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhc57ysWC90G-1nBrBXHQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:30.612044 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:37500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhc6rABkC4fWIHEf8EGVAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:41:54.072198 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:40166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdAkr9dMAiw-8KANNZvQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:54.359317 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:37508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdAs_BxrYCr4hPDw_9xQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:56.789567 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:36740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdBEr9dMAiw-8KANNZwAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:58.111255 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:44008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdBlajLEzk2WiQ-10mZQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:04.646840 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:54238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdDLysWC90G-1nBrBXLAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:06.997536 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:48442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdDqQpVkWug9HeOt9I0QAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:09.179060 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:44020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdEVajLEzk2WiQ-10mcwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:10.503957 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:57006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdElajLEzk2WiQ-10mdgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:42:11.715044 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:57016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdE0r9dMAiw-8KANNZwwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:12.754710 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:48444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdFFajLEzk2WiQ-10megAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:14.138168 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:57024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdFqTCbgAP5jq5Teg__AAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:17.218200 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:38864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdGf9ocpUE4ed4uDwFtgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:20.585449 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:38866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdHI6lpbStxTqkSkt95gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:21.913690 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:55360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdHdSswJuvopo3lOhycwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:23.280179 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:55370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdH1ajLEzk2WiQ-10mewAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:24.597110 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdIP9ocpUE4ed4uDwFvgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:25.891742 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:55384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdIdSswJuvopo3lOhyewAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:28.481945 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:55390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJNSswJuvopo3lOhygAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:29.732362 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:55392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJf9ocpUE4ed4uDwFwwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:30.886354 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:55562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJlajLEzk2WiQ-10mfAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:32.173770 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:55568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKLABkC4fWIHEf8EGZQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:33.527410 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:55574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKf9ocpUE4ed4uDwFxwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:34.969324 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:55590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKlajLEzk2WiQ-10mggAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:36.174340 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:55592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLP9ocpUE4ed4uDwFzAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:37.380986 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:55600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLVajLEzk2WiQ-10mhAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:38.801172 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:55602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLo6lpbStxTqkSkt96AAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:40.006483 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:55614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMLABkC4fWIHEf8EGagAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:41.205328 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMY6lpbStxTqkSkt96QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:42.511904 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:35450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMo6lpbStxTqkSkt96gAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:43.718712 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:35466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdM6QpVkWug9HeOt9I1wAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:45.049647 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:35482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdNbABkC4fWIHEf8EGbAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:46.297219 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:35488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdNqQpVkWug9HeOt9I2AAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:47.459450 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:35498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdN6TCbgAP5jq5TehAAQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:49.201916 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:35514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdOKQpVkWug9HeOt9I2QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:50.625195 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:60134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdOlajLEzk2WiQ-10mhwAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:51.933673 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdO_9ocpUE4ed4uDwF2gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:53.142333 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:60158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdPdSswJuvopo3lOhyhgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:54.493147 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:60164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdPrABkC4fWIHEf8EGcAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:55.840864 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:60166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdP9SswJuvopo3lOhyiAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:57.015889 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:60174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQUr9dMAiw-8KANNZ2gAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:58.338947 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:60178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQtSswJuvopo3lOhyigAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:59.495548 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:60190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQ9SswJuvopo3lOhyjAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:00.872990 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:37742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdREr9dMAiw-8KANNZ3wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.037389 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:37752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdRrysWC90G-1nBrBXOAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.041908 2026] [mime_magic:error] [pid 10651:tid 140411733534464] (70014)End of file found: [client 74.7.243.203:37752] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.670429 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:37760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdRrysWC90G-1nBrBXOQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:03.854900 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:37776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdR7ABkC4fWIHEf8EGcwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:05.048693 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:37780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdSbABkC4fWIHEf8EGdAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:05.857945 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:57038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdSf9ocpUE4ed4uDwF7AAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:07.162800 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:52148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdS8_BxrYCr4hPDw_91gAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:08.344528 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:48756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdTI6lpbStxTqkSkt97wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:08.661214 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:37784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdTLysWC90G-1nBrBXPAAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:11.803863 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdT46lpbStxTqkSkt98wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:14.210900 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:48782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdUqQpVkWug9HeOt9I5gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:14.415106 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:37800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdUs_BxrYCr4hPDw_92wAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:15.470093 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:48784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdU9SswJuvopo3lOhyjQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:17.923115 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:48800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdVLysWC90G-1nBrBXPgAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:19.406788 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:58856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdV7ysWC90G-1nBrBXQwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:20.651257 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:58870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdWLysWC90G-1nBrBXRwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:22.047484 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:58886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdWo6lpbStxTqkSkt99wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:25.144665 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:57516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdXbysWC90G-1nBrBXTAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:26.508153 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:58056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdXv9ocpUE4ed4uDwF9gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:28.736547 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.243.203:58060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdYKTCbgAP5jq5TehACwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:31.499027 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:58070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdYtSswJuvopo3lOhykgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:32.579881 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:58902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdZP9ocpUE4ed4uDwF-wAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:35.049093 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:46986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdZ8_BxrYCr4hPDw_93wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:36.404641 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:47000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdaI6lpbStxTqkSkt9-gAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:37.594126 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:47014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdaVajLEzk2WiQ-10mmwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:49.368961 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:39080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhddaTCbgAP5jq5TehAJwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:56.839287 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:36938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdfKTCbgAP5jq5TehALwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:58.900010 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:58132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdfo6lpbStxTqkSkt9_QAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:05.729507 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:42418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdhf9ocpUE4ed4uDwGEwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:11.522705 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:42420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdi8_BxrYCr4hPDw_96AAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:19.419297 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:38176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdk0r9dMAiw-8KANNaKgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:19.915250 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:35608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdk_9ocpUE4ed4uDwGHwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:44:22.948949 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:53340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdlrABkC4fWIHEf8EGkgAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:26.560931 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdmo6lpbStxTqkSkt-CAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:44.073182 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:53366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdrNSswJuvopo3lOhyuAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:45.412801 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:43932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdrUr9dMAiw-8KANNaQAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:45.414798 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.244.31:34694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhdrUr9dMAiw-8KANNaPwAAARg"]
[Mon Mar 16 16:44:48.254541 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:51234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdsLysWC90G-1nBrBXdAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:49.566734 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:57408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdsc_BxrYCr4hPDw_97wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:50.698808 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:57410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdso6lpbStxTqkSkt-EwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:52.011954 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:57416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtP9ocpUE4ed4uDwGIwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:53.295419 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:57422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtf9ocpUE4ed4uDwGJAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:55.567914 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:57426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtlajLEzk2WiQ-10mtgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:55.568237 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:43940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtrABkC4fWIHEf8EGogAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:56.859735 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhduLABkC4fWIHEf8EGpQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:58.076890 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:42738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdukr9dMAiw-8KANNaTAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:59.360780 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:42742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdu_9ocpUE4ed4uDwGJwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:00.605504 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:42756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdvP9ocpUE4ed4uDwGKQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:02.269046 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:42768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdvlajLEzk2WiQ-10muAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:03.439003 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:42772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdv1ajLEzk2WiQ-10mugAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:03.927071 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:45446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdv7ABkC4fWIHEf8EGrQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:45:04.851021 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:42780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdwP9ocpUE4ed4uDwGLAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:06.163919 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:42784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdwqQpVkWug9HeOt9I-AAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:08.363541 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:42790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdw6QpVkWug9HeOt9I-QAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:09.666225 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:42116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdxUr9dMAiw-8KANNaWAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:10.848030 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:42124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdxqTCbgAP5jq5TehAQwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:12.048114 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:42130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdyLysWC90G-1nBrBXdwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:13.443108 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdyY6lpbStxTqkSkt-FgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:14.622856 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:42142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdylajLEzk2WiQ-10mvQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:16.301942 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:42158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdy9SswJuvopo3lOhyugAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:17.671084 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:42172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdzbysWC90G-1nBrBXewAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:18.899707 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:36704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdzlajLEzk2WiQ-10mvgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:20.063237 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:36720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0M_BxrYCr4hPDw_99wAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:21.431270 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:36734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0c_BxrYCr4hPDw_9-AAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:23.031103 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:47874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0v9ocpUE4ed4uDwGOwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:23.031269 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:36746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0kr9dMAiw-8KANNaZgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:24.370462 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:34248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1FajLEzk2WiQ-10mvwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:24.463195 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:36748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1KQpVkWug9HeOt9I_QAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:25.833529 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:36758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1aTCbgAP5jq5TehARwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:27.102602 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:36764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd16QpVkWug9HeOt9I_gAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:28.434419 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:40030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd2FajLEzk2WiQ-10mwQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:29.634733 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:40034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd2VajLEzk2WiQ-10mwgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:32.043597 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:40048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd3Er9dMAiw-8KANNacAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:45:32.304564 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:34264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd3LABkC4fWIHEf8EGugAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:39.785504 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:40058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd47ABkC4fWIHEf8EGxwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:41.092052 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:42650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd5f9ocpUE4ed4uDwGPQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:42.270737 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd5o6lpbStxTqkSkt-IAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:43.563442 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:42660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd59SswJuvopo3lOhywAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:52.012542 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:40958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8LABkC4fWIHEf8EG1QAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:53.354261 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:60412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8bysWC90G-1nBrBXhQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:54.550847 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:60428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8qTCbgAP5jq5TehATQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:55.859426 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:60442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd86TCbgAP5jq5TehATgAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:57.059718 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:60456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd9aTCbgAP5jq5TehATwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:59.453361 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:60462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd97ABkC4fWIHEf8EG2gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:00.849457 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:35332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd-NSswJuvopo3lOhyxgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:03.118199 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:35346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd-6QpVkWug9HeOt9JAwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:05.435030 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:35360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd_bysWC90G-1nBrBXiwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:06.721971 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:35376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd_qQpVkWug9HeOt9JBAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:07.231456 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:42674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd__9ocpUE4ed4uDwGWwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:08.002589 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:35378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheANSswJuvopo3lOhyygAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:09.154734 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:35394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheAdSswJuvopo3lOhyzAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:10.479658 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:58186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheAs_BxrYCr4hPDw_-AQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:11.708506 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:58196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheA0r9dMAiw-8KANNakwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:13.031498 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:58208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheBdSswJuvopo3lOhy0QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:13.167518 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:42740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheBY6lpbStxTqkSkt-KQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:15.267243 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:58212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheB_9ocpUE4ed4uDwGXwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:16.570636 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:58228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCFajLEzk2WiQ-10m1gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:16.967395 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:42754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCNSswJuvopo3lOhy2AAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:17.776408 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:58240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCY6lpbStxTqkSkt-KgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:21.255757 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.243.203:58250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheDc_BxrYCr4hPDw_-BQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:22.587075 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:46610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheDv9ocpUE4ed4uDwGYAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:23.932377 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:46618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheD7ysWC90G-1nBrBXjwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:24.350884 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.228.16:37972] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abheEI6lpbStxTqkSkt-LgAAAlc"]
[Mon Mar 16 16:46:25.122768 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:46626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheEY6lpbStxTqkSkt-LwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:26.432920 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:46628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheElajLEzk2WiQ-10m2wAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:27.585494 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:46636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheE6TCbgAP5jq5TehAYAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:30.061178 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:46650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheFv9ocpUE4ed4uDwGZAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:31.352870 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:51376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheF_9ocpUE4ed4uDwGZwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:32.643779 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:51390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheGM_BxrYCr4hPDw_-CQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:33.981028 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:51404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheGaQpVkWug9HeOt9JCwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:36.507783 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:51420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheG6QpVkWug9HeOt9JDQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:38.951134 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:51426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheHv9ocpUE4ed4uDwGbgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:40.274952 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:43634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheILysWC90G-1nBrBXlgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:46.375732 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:43636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheJY6lpbStxTqkSkt-OQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:47.820768 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:43648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheJ7ABkC4fWIHEf8EG5wAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:49.007598 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:43664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheKbysWC90G-1nBrBXmAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:49.796238 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:43108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheKaTCbgAP5jq5TehAdAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:51.089427 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:51334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheK9SswJuvopo3lOhy3QAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:51.650118 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheK0r9dMAiw-8KANNaugAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:52.299439 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:51340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLKQpVkWug9HeOt9JEwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:52.979035 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLFajLEzk2WiQ-10m4AAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:53.535436 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:51356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLc_BxrYCr4hPDw_-EAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:54.160683 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:47504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLv9ocpUE4ed4uDwGcQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:54.830991 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:51372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLv9ocpUE4ed4uDwGcgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:57.227225 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheMf9ocpUE4ed4uDwGdgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:01.567418 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:37964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheNbABkC4fWIHEf8EG7QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:04.058025 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:37974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheNrABkC4fWIHEf8EG7wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:05.459891 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:37982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheOdSswJuvopo3lOhy4QAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:06.752606 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:37988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheOv9ocpUE4ed4uDwGgQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:07.950378 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:37996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheO6QpVkWug9HeOt9JFgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.347145 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:35950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePc_BxrYCr4hPDw_-FAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.551847 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:35950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePc_BxrYCr4hPDw_-FQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.901079 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePf9ocpUE4ed4uDwGhgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:11.190311 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:40092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheP7ysWC90G-1nBrBXoQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:12.054985 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:35966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQLysWC90G-1nBrBXogAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:12.516223 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:40106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQI6lpbStxTqkSkt-PwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:13.374928 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:35974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQf9ocpUE4ed4uDwGhwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:16.173706 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:40116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheREr9dMAiw-8KANNaygAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:16.495061 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:35990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheRLABkC4fWIHEf8EG9wAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:19.015985 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:36006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheRdSswJuvopo3lOhy5QAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:20.392500 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:59196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSLABkC4fWIHEf8EG-wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:21.596084 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:59210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSY6lpbStxTqkSkt-QgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:22.930391 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:59212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSqTCbgAP5jq5TehAgAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:24.188367 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:59226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheTLABkC4fWIHEf8EG_gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:26.787036 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:59234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheTrysWC90G-1nBrBXrQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:31.431323 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:59236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheU7ysWC90G-1nBrBXsgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:32.768790 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:35864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheVM_BxrYCr4hPDw_-HAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:33.906283 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:35868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheVdSswJuvopo3lOhy6gAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:35.253422 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:35882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheV_9ocpUE4ed4uDwGjwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:36.471871 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheWEr9dMAiw-8KANNa1AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:37.876365 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:35886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheWaQpVkWug9HeOt9JHwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:39.088587 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:50068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheW1ajLEzk2WiQ-10m9QAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:41.717125 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:50082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheXdSswJuvopo3lOhy8AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:43.022052 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:50084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheX6QpVkWug9HeOt9JIQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:44.202301 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:50096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheYEr9dMAiw-8KANNa1wAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:45.439661 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:50102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheYaQpVkWug9HeOt9JIgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:47.943076 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheY46lpbStxTqkSkt-TgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:49.473835 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:39972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheZf9ocpUE4ed4uDwGlQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:50.733553 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:39976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheZlajLEzk2WiQ-10m-wAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:52.115830 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheaP9ocpUE4ed4uDwGlwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:53.327463 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:39990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheaUr9dMAiw-8KANNa3QAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:54.569802 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:40004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhearysWC90G-1nBrBXuAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:55.879392 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:40016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhea9SswJuvopo3lOhy8gAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:58.395108 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:40022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheblajLEzk2WiQ-10m_gAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:59.854961 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:40882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheb7ysWC90G-1nBrBXuwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:00.533861 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:40122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecKTCbgAP5jq5TehAowAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:01.102309 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:40890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecUr9dMAiw-8KANNa4AAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:03.035909 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:40902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecrysWC90G-1nBrBXvQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:03.039994 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecdSswJuvopo3lOhy-AAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:04.303565 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:40916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedI6lpbStxTqkSkt-UwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:04.367844 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:49902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedKQpVkWug9HeOt9JKgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:05.765804 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:40920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedaTCbgAP5jq5TehApAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:05.827178 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:49914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedY6lpbStxTqkSkt-VAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:07.164534 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:40934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhed6TCbgAP5jq5TehApQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:08.243461 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:49924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeFajLEzk2WiQ-10nBAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:08.386640 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:48938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeKTCbgAP5jq5TehApwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:09.600770 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeVajLEzk2WiQ-10nBQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:10.671586 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:48952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhees_BxrYCr4hPDw_-LwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:11.003134 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:60088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhee9SswJuvopo3lOhy-wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:12.309171 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:60102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhefI6lpbStxTqkSkt-WAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:13.959274 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:48966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhefbysWC90G-1nBrBXwwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:16.486440 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhegP9ocpUE4ed4uDwGnwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:18.863361 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:48978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhegqQpVkWug9HeOt9JMQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:23.885057 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheh46lpbStxTqkSkt-XQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:25.335438 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:37250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheiUr9dMAiw-8KANNa6AAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:27.960070 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:37256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhei6QpVkWug9HeOt9JOQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:29.314044 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:37264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhejf9ocpUE4ed4uDwGpgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:32.697911 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:32876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhekLABkC4fWIHEf8EHNwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:37.279258 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:51216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhelbysWC90G-1nBrBX1gAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:39.666978 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:32890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhel7ABkC4fWIHEf8EHSQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:40.951185 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:35416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhemM_BxrYCr4hPDw_-MwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:42.136619 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:37872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhemrABkC4fWIHEf8EHTgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:48.782448 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:37874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhen8_BxrYCr4hPDw_-OAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:57.256036 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:35418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqUr9dMAiw-8KANNbAAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:57.361192 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:36062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqUr9dMAiw-8KANNbAQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:58.710319 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:39030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqv9ocpUE4ed4uDwGqwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:59.958905 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:39042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheq6QpVkWug9HeOt9JPgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:01.252128 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:39046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abherVajLEzk2WiQ-10nFAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:02.604729 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:39060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abherqTCbgAP5jq5TehAtAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:03.827663 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:39070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abher_9ocpUE4ed4uDwGrAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:05.169327 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhesdSswJuvopo3lOhzCAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:05.359254 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:50196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhesY6lpbStxTqkSkt-aAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:49:06.600280 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:39086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhess_BxrYCr4hPDw_-OgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:07.971329 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:39098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhes1ajLEzk2WiQ-10nFgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:10.335635 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:43420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhets_BxrYCr4hPDw_-PgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:12.902119 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:43436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheuI6lpbStxTqkSkt-bQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:15.462130 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:43452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheu0r9dMAiw-8KANNbCAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:16.779103 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:43466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhevLABkC4fWIHEf8EHcwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:18.003307 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhevqTCbgAP5jq5TehAtwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:20.463320 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:50022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhewNSswJuvopo3lOhzDQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:22.997781 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:50026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhews_BxrYCr4hPDw_-RwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:24.443117 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:50040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhexP9ocpUE4ed4uDwGsAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:26.736102 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:50050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhexo6lpbStxTqkSkt-cQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:30.751502 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:36268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheyrABkC4fWIHEf8EHfwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:32.111427 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:36270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhezLysWC90G-1nBrBX5QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:33.601236 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:36286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhezaTCbgAP5jq5TehAvAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:39.450487 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:36294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe01ajLEzk2WiQ-10nIQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:40.787790 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe1KTCbgAP5jq5TehAvgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:42.020661 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:33600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe1lajLEzk2WiQ-10nIgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:43.374892 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:33612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe18_BxrYCr4hPDw_-TgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:46.996531 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:33622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe2tSswJuvopo3lOhzFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:48.338997 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:38366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe3I6lpbStxTqkSkt-dwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:49.628358 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe3aQpVkWug9HeOt9JeQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:52.052587 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:38388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe4LysWC90G-1nBrBX6gAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:53.424366 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:38398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe4dSswJuvopo3lOhzGwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:55.795781 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:38412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe48_BxrYCr4hPDw_-VQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:57.407499 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:38424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe5bysWC90G-1nBrBX7AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:58.750216 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:51174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe5v9ocpUE4ed4uDwGtwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:00.016988 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:51178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe6KTCbgAP5jq5TehAwQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:01.628350 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:51188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe6f9ocpUE4ed4uDwGugAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:03.292045 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:51198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe67ysWC90G-1nBrBX7wAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:04.621044 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:51206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe7KQpVkWug9HeOt9JiwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:05.960506 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:51218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe7bABkC4fWIHEf8EHkQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:08.435523 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:51226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe8FajLEzk2WiQ-10nLgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:09.873046 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:42686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe8bABkC4fWIHEf8EHlQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:11.157343 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe87ABkC4fWIHEf8EHlgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:12.487906 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:42696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe9KQpVkWug9HeOt9JkgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:14.809291 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:42708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe9qQpVkWug9HeOt9JmQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:17.269775 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe-P9ocpUE4ed4uDwGwAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:18.648660 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:60640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe-o6lpbStxTqkSkt-kAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:24.427312 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:60656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfAP9ocpUE4ed4uDwG1gAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:25.771482 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:60666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfAbABkC4fWIHEf8EHpAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:27.027585 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:60670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfA6TCbgAP5jq5TehAywAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:28.350197 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfBI6lpbStxTqkSkt-mQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:30.837175 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:46140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfBrysWC90G-1nBrBX_QAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:34.124428 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:46154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfCtSswJuvopo3lOhzLAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:35.531463 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:46168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfC0r9dMAiw-8KANNbKQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:37.890112 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfDbysWC90G-1nBrBYAQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:43.507656 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:40930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfE0r9dMAiw-8KANNbMwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:44.857146 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:40940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfFEr9dMAiw-8KANNbNAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:46.105415 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:40946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfFrABkC4fWIHEf8EHrAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:51.224425 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:40958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfGs_BxrYCr4hPDw_-awAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:52.581708 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:34842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfHLysWC90G-1nBrBYBgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:53.770922 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:34852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfHdSswJuvopo3lOhzNwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:55.079110 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:34860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfH6TCbgAP5jq5TehA1QAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:55.079597 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:39014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfH6QpVkWug9HeOt9JwAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:50:56.395436 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:45426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfILABkC4fWIHEf8EHrgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:58.576370 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:34866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfIs_BxrYCr4hPDw_-bwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:59.947513 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:46532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfI1ajLEzk2WiQ-10nSAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:03.046092 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:46548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfJ9SswJuvopo3lOhzOwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:03.335600 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:45440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfJ6TCbgAP5jq5TehA2wAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:04.371441 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:46556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfKKQpVkWug9HeOt9JwgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:06.780997 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:46572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfKqQpVkWug9HeOt9JxAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:10.311106 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:52684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfLkr9dMAiw-8KANNbRwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:10.507475 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:46774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfLs_BxrYCr4hPDw_-dQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:14.067408 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:46790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfMlajLEzk2WiQ-10nTgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:24.699596 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.228.16:40486] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhfPP9ocpUE4ed4uDwG9AAAAhg"]
[Mon Mar 16 16:51:29.984953 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:34036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfQf9ocpUE4ed4uDwG_wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:32.423641 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:36196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfRKQpVkWug9HeOt9J0wAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:36.671011 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSI6lpbStxTqkSkt-6AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:38.014595 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:52116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSrysWC90G-1nBrBYHAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:38.227766 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:36206] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSrABkC4fWIHEf8EHyAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:42.947692 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:36212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfTqQpVkWug9HeOt9J2wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:44.323682 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:38928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfUM_BxrYCr4hPDw_-gAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:47.877267 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:38936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfU_9ocpUE4ed4uDwHCQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:49.176519 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.243.203:38942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfVUr9dMAiw-8KANNbWAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:59.527408 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfX7ysWC90G-1nBrBYJwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:00.928203 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:41232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfYKTCbgAP5jq5TehA7wAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:02.180436 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:41248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfYrABkC4fWIHEf8EHzgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:03.385923 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:41256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfY6TCbgAP5jq5TehA8AAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:04.759288 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:41266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfZKTCbgAP5jq5TehA8gAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:10.743764 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfarysWC90G-1nBrBYMAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:26.984839 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:42688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfeqQpVkWug9HeOt9J8AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:30.446184 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfftSswJuvopo3lOhzigAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:34.158491 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:33542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfgs_BxrYCr4hPDw_-jAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:39.526889 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:33550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfh_9ocpUE4ed4uDwHGAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:47.132676 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfj0r9dMAiw-8KANNbhAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:06.910290 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:47530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfokr9dMAiw-8KANNbpAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:53:21.788539 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:54436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfsY6lpbStxTqkSkt_LgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:53:37.654720 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:38190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfwaQpVkWug9HeOt9KCQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:40.255883 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:41836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfxLysWC90G-1nBrBYPwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:53:55.116976 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:53664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf07ABkC4fWIHEf8EILAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:56.458663 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:42226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf1LABkC4fWIHEf8EILQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:01.074423 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:42234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf2aTCbgAP5jq5TehBCwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:11.674154 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:41036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf46QpVkWug9HeOt9KGwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:14.243639 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:52900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf5o6lpbStxTqkSkt_PgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:14.355092 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:41848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf5tSswJuvopo3lOhzvwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:16.839060 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:52902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf6Er9dMAiw-8KANNb2wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:18.832692 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:39206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf6tSswJuvopo3lOhzxQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:19.261829 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:52906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf68_BxrYCr4hPDw_-nQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:20.604780 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:46950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7KQpVkWug9HeOt9KHAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:21.279162 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:33700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7Ur9dMAiw-8KANNb4AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:22.679559 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:33704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7kr9dMAiw-8KANNb4gAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:22.956492 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:46956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7rysWC90G-1nBrBYSgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:25.280904 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:46962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf8Ur9dMAiw-8KANNb5wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:28.522664 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:33714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf9FajLEzk2WiQ-10nmAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:54:32.136610 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:45094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf-M_BxrYCr4hPDw_-owAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:46.290461 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.244.31:57008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhgBo6lpbStxTqkSkt_RgAAAkI"]
[Mon Mar 16 16:55:03.411459 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:45096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgF1ajLEzk2WiQ-10nuQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:55:06.042211 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:44902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgGlajLEzk2WiQ-10nvQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:55:09.635429 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:44910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgHUr9dMAiw-8KANNcBAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:56:00.200427 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:46974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUNSswJuvopo3lOh0IgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:01.511322 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUdSswJuvopo3lOh0JAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:02.762999 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:41098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUkr9dMAiw-8KANNcNQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:04.211134 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:41104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVEr9dMAiw-8KANNcNwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:05.414127 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:41116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVc_BxrYCr4hPDw_-rQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:06.545431 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.243.203:41128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVlajLEzk2WiQ-10nzwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:20.556240 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:41130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgZLABkC4fWIHEf8EIVgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:26.238145 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.228.16:52806] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhgatSswJuvopo3lOh0JwAAAIc"]
[Mon Mar 16 16:56:31.307419 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgb0r9dMAiw-8KANNcUAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:35.080804 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:38582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgc6QpVkWug9HeOt9KLgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:56:36.119511 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgdP9ocpUE4ed4uDwHYgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:36.561155 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:38588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgdKQpVkWug9HeOt9KLwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:45.503152 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:58228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgff9ocpUE4ed4uDwHbAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:47.962540 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:58952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgf6TCbgAP5jq5TehBbgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:58.802187 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:38602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgirysWC90G-1nBrBYbwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:00.105699 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjI6lpbStxTqkSkt_ZwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:01.266310 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:36368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjbABkC4fWIHEf8EIZAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:02.456015 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:58958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjrABkC4fWIHEf8EIZgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:57:03.758466 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:56086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgj9SswJuvopo3lOh0LwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:06.044260 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:36384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgkrABkC4fWIHEf8EIagAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:57:33.391902 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:36396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgrc_BxrYCr4hPDw_-1gAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:34.789320 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:59084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgrs_BxrYCr4hPDw_-1wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:36.055837 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:59092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsM_BxrYCr4hPDw_-2QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:37.415311 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:59104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsVajLEzk2WiQ-10n3AAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:38.692912 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:52738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsrysWC90G-1nBrBYegAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:39.885607 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:52744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgs7ysWC90G-1nBrBYfQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:41.307491 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:52760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgtVajLEzk2WiQ-10n3QAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:44.312654 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:52768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguKTCbgAP5jq5TehBiQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:45.576603 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:56100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguUr9dMAiw-8KANNccwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:45.658917 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:52776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguaQpVkWug9HeOt9KWwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:46.875043 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:52782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgulajLEzk2WiQ-10n3gAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:48.269038 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:45448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvM_BxrYCr4hPDw_-3AAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:49.473450 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:45452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvbysWC90G-1nBrBYhAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:50.290212 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:59608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvrysWC90G-1nBrBYhwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:50.830428 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:45462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvlajLEzk2WiQ-10n4gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:51.669401 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:57850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgv0r9dMAiw-8KANNcdQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:52.010795 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgwP9ocpUE4ed4uDwHdwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:53.417168 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgwdSswJuvopo3lOh0NwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:55.738146 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:45480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgw_9ocpUE4ed4uDwHegAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:58.063649 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgxaTCbgAP5jq5TehBiwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:00.342840 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:33552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgx6QpVkWug9HeOt9KaQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:01.718788 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:33558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgydSswJuvopo3lOh0PAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:02.931592 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:33568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgykr9dMAiw-8KANNcdwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:04.375394 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:33574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgzKTCbgAP5jq5TehBjgAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:06.687739 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgzqQpVkWug9HeOt9KeAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:08.048770 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:33602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg0NSswJuvopo3lOh0QgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:09.302001 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:45380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg0Ur9dMAiw-8KANNceQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:12.033953 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:45396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1Er9dMAiw-8KANNcfQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:13.380888 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:45406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1Y6lpbStxTqkSkt_dwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:14.572065 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:45420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1tSswJuvopo3lOh0QwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:17.139263 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg2dSswJuvopo3lOh0RQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:21.316555 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:58980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg3Y6lpbStxTqkSkt_fwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:26.048158 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:58990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg4tSswJuvopo3lOh0TAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:27.365223 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:59006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg446lpbStxTqkSkt_gQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:28.617252 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:48356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg5KTCbgAP5jq5TehBpQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:29.938037 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:48366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg5Ur9dMAiw-8KANNciAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:31.137313 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:48368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg50r9dMAiw-8KANNciQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:37.095568 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:48374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg7Ur9dMAiw-8KANNcjwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:40.197635 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:60224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg8FajLEzk2WiQ-10n5gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:44.989711 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:60234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg9P9ocpUE4ed4uDwHgAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:07.336150 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:60238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhC7ABkC4fWIHEf8EI0wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:59:24.530529 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:53864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhHLABkC4fWIHEf8EI-QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:27.016431 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhH_9ocpUE4ed4uDwHkwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:28.439409 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:52502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhIP9ocpUE4ed4uDwHlAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:37.018437 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:52512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhKbABkC4fWIHEf8EJEAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:42.763152 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:59546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhLrABkC4fWIHEf8EJGwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:46.513334 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:59552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhMkr9dMAiw-8KANNcoQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:46.867373 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:37896] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhhMrABkC4fWIHEf8EJIQAAAFg"]
[Mon Mar 16 17:00:31.124445 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:59560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhX7ABkC4fWIHEf8EJXAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:00:33.723789 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:53202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhYdSswJuvopo3lOh0ZQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:00:40.931203 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:53208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhaP9ocpUE4ed4uDwHuwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:42.343021 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:55758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhaqTCbgAP5jq5TehB3AAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:43.611104 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhha0r9dMAiw-8KANNcqQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:45.009124 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:55772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhbdSswJuvopo3lOh0ZgAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:47.399315 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:55788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhb6QpVkWug9HeOt9K1AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:48.802797 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:45366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhcKQpVkWug9HeOt9K1QAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:54.465004 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:45374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhdqQpVkWug9HeOt9K2wAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:56.979284 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:45384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhheLysWC90G-1nBrBYxgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:58.305244 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:39244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhheqQpVkWug9HeOt9K3gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:03.332107 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:39246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhf46lpbStxTqkSkt_nQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:04.641444 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:39256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhgEr9dMAiw-8KANNcqwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:06.971591 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:39264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhgv9ocpUE4ed4uDwH1AAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:08.335110 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:58378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhhI6lpbStxTqkSkt_ngAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:09.526754 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:58390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhhc_BxrYCr4hPDw_-_AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:19.676069 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:58400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhj7ABkC4fWIHEf8EJbAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:21.046672 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:44664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhkY6lpbStxTqkSkt_oAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:22.297553 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:44672] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhkv9ocpUE4ed4uDwH6gAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:24.335831 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:44676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhk0r9dMAiw-8KANNcsAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:25.663527 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:44686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhlY6lpbStxTqkSkt_oQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:27.055439 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:44700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhl6QpVkWug9HeOt9K4AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:27.163636 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.228.16:36326] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhhl0r9dMAiw-8KANNcsQAAAQQ"]
[Mon Mar 16 17:01:28.271659 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:46182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhmKTCbgAP5jq5TehB4QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:29.595219 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:46186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhmbysWC90G-1nBrBY3QAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:39.319195 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:46188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhho7ABkC4fWIHEf8EJdwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:40.644860 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:47872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhpLABkC4fWIHEf8EJeAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:41.795679 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhpf9ocpUE4ed4uDwH_wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:43.115773 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhp8_BxrYCr4hPDw__BAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:50.989872 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:47892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhrlajLEzk2WiQ-10oJgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:54.519451 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:56936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhsrABkC4fWIHEf8EJhwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:57.045590 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:56950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhtdSswJuvopo3lOh0fAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:58.430330 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:59824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhtqTCbgAP5jq5TehB5gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:59.695338 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:59828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhht6QpVkWug9HeOt9K6wAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:06.585528 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:59844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhvdSswJuvopo3lOh0ggAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:08.996728 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:59846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhwFajLEzk2WiQ-10oKwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:10.339133 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:41018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhwtSswJuvopo3lOh0hAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:11.559787 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:41022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhw_9ocpUE4ed4uDwIHwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:19.751060 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:41032] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhy8_BxrYCr4hPDw__HQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:21.116407 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:41002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhzVajLEzk2WiQ-10oLwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:22.419194 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:41016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhzlajLEzk2WiQ-10oMAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:23.342549 2026] [access_compat:error] [pid 29802:tid 140411733534464] [client 45.94.31.197:51364] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 17:02:38.482012 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh3v9ocpUE4ed4uDwINQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:02:41.585963 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:39210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh4c_BxrYCr4hPDw__IwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:02:48.607204 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:39212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh6NSswJuvopo3lOh0lgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:02:52.143340 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:49636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh7LABkC4fWIHEf8EJowAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:03:26.455491 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:49646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiDs_BxrYCr4hPDw__QwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:04:39.691096 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:55660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiV6TCbgAP5jq5TehCQgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:04:50.251710 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.244.31:35018] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhiYrABkC4fWIHEf8EKEQAAAEA"]
[Mon Mar 16 17:06:02.831552 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:46748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiqrABkC4fWIHEf8EKagAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:11.810361 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:39968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhis7ysWC90G-1nBrBZlgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:13.243299 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:42042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhitc_BxrYCr4hPDw__jAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:19.232755 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:42054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiu8_BxrYCr4hPDw__mgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:23.342378 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:60528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhivqTCbgAP5jq5TehCTgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:26.884221 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:60544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiwqQpVkWug9HeOt9LdgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:28.193015 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:46394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhixLABkC4fWIHEf8EKawAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:28.266555 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.228.16:50178] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhixI6lpbStxTqkSkuAAQAAAlc"]
[Mon Mar 16 17:06:35.263004 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:46404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiy6TCbgAP5jq5TehCVwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:43.258568 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:46420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhi00r9dMAiw-8KANNc-QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:07:13.197397 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:45694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhi8c_BxrYCr4hPDw__9gAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:07:55.782539 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:34832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjG7ysWC90G-1nBrBZ4wAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:08:04.814335 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:41198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjJKQpVkWug9HeOt9LhwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:08:08.367876 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjKEr9dMAiw-8KANNdCgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:08:55.622377 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjV0r9dMAiw-8KANNdOgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:09:00.819166 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:47756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjXLABkC4fWIHEf8EK5AAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:11.843857 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:35440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjZ7ABkC4fWIHEf8EK7QAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:13.131507 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:38680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjac_BxrYCr4hPDw8AJQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:14.737898 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:38686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjaqQpVkWug9HeOt9LjQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:16.052875 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:38694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbLABkC4fWIHEf8EK7gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:17.458637 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbbABkC4fWIHEf8EK7wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:18.672877 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:38712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbrABkC4fWIHEf8EK8AAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:20.033277 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:38726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcP9ocpUE4ed4uDwImgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:21.317397 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcUr9dMAiw-8KANNdPQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:22.707270 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:44752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcqQpVkWug9HeOt9LjgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:23.923249 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:44754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjc6TCbgAP5jq5TehChgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:25.279035 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:44756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjdVajLEzk2WiQ-10onwAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:26.616766 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:44772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjdrysWC90G-1nBrBZ9QAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:27.863489 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:44776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjd9SswJuvopo3lOh05wAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:29.225535 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:44790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjeVajLEzk2WiQ-10ooQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:30.631865 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:45776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjerysWC90G-1nBrBZ9gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:31.814986 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:45782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhje6TCbgAP5jq5TehChwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:33.031247 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:45784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjfVajLEzk2WiQ-10opAAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:34.321587 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:45798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjflajLEzk2WiQ-10opwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:35.650355 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.243.203:45812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjf0r9dMAiw-8KANNdPwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:36.830764 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:45816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjgEr9dMAiw-8KANNdQAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:38.159460 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:45826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjgqQpVkWug9HeOt9LlQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:39.556105 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:45834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjg8_BxrYCr4hPDw8AKQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:40.794044 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:37962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjhFajLEzk2WiQ-10oqAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:41.987378 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:37978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjhdSswJuvopo3lOh06QAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:43.365522 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.243.203:37984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjh8_BxrYCr4hPDw8AKgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:44.641950 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:37990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjiEr9dMAiw-8KANNdQwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:45.965796 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:38006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjibysWC90G-1nBrBZ_QAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:47.227801 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:38022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhji6QpVkWug9HeOt9LlwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:48.627505 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.243.203:38026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjjM_BxrYCr4hPDw8AKwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:49.837511 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:38038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjjdSswJuvopo3lOh06gAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:51.171289 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:53964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjj7ysWC90G-1nBrBZ_gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:51.206891 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:60578] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhjj9SswJuvopo3lOh07AAAAIY"]
[Mon Mar 16 17:09:52.394251 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:53980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkM_BxrYCr4hPDw8ALwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:53.682998 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:53982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkaTCbgAP5jq5TehCjQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:54.869612 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:53996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkrABkC4fWIHEf8EK9gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:56.162638 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:53998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlP9ocpUE4ed4uDwIvgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:57.362338 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:54008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlf9ocpUE4ed4uDwIwAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:59.074603 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:54022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlv9ocpUE4ed4uDwIxAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:00.450549 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:49506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjmKQpVkWug9HeOt9LnQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:01.799615 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:49510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjmaQpVkWug9HeOt9LnwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:03.201276 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:49522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjm0r9dMAiw-8KANNdSAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:03.594103 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:51230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjm_9ocpUE4ed4uDwIzQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:04.444796 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:49528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjnLysWC90G-1nBrBaAgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:05.791320 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:49540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjnaQpVkWug9HeOt9LoAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:07.002976 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:49542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjn7ABkC4fWIHEf8EK_QAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:08.326032 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:49558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjoP9ocpUE4ed4uDwIzgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:09.564557 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:49564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjobABkC4fWIHEf8ELBAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:10.756469 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:57808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjorABkC4fWIHEf8ELBgAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:10.967519 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:41728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjov9ocpUE4ed4uDwI0gAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:12.114512 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:42944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpNSswJuvopo3lOh07wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:12.340589 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:41740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpKQpVkWug9HeOt9LoQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:13.592727 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:41756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpVajLEzk2WiQ-10orQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:14.833413 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:41766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjps_BxrYCr4hPDw8AMwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:16.220498 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:41782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqI6lpbStxTqkSkuAcAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:17.543413 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:41796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqUr9dMAiw-8KANNdTAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:18.871874 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:41806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqtSswJuvopo3lOh08gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:20.114590 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:45528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrLABkC4fWIHEf8ELBwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:21.474760 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.243.203:45538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrc_BxrYCr4hPDw8ANQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:22.666993 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:45544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrrABkC4fWIHEf8ELCAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:23.936378 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:45548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjr7ABkC4fWIHEf8ELCQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:25.166211 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:45556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjsY6lpbStxTqkSkuAcwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:26.527409 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:45568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjstSswJuvopo3lOh0-gAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:27.710751 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:45584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjs0r9dMAiw-8KANNdTQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:29.094535 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjtbABkC4fWIHEf8ELDwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:30.298048 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:45532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjtrysWC90G-1nBrBaCwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:31.663762 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:45538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjt7ysWC90G-1nBrBaDAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:32.920311 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:45554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjuLABkC4fWIHEf8ELEgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:34.167191 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:45560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjurysWC90G-1nBrBaDQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:35.453044 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:45568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhju7ysWC90G-1nBrBaDgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:36.907360 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:45576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjvNSswJuvopo3lOh0_QAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:38.140300 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:45590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjvs_BxrYCr4hPDw8AOAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:39.368849 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:45594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjv1ajLEzk2WiQ-10oswAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:40.713298 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:32852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwLABkC4fWIHEf8ELEwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:41.999996 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:32866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwbABkC4fWIHEf8ELFQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:42.744390 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:42958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwqQpVkWug9HeOt9LvAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:43.211306 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:32868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjw8_BxrYCr4hPDw8AOgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:44.140937 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:35300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxFajLEzk2WiQ-10otAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:44.551902 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:32872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxKTCbgAP5jq5TehCowAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:45.959866 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:32886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxY6lpbStxTqkSkuAdQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:47.087067 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:32898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjx7ysWC90G-1nBrBaDwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:48.475202 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:32904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjyLABkC4fWIHEf8ELGQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:49.821318 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:32920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjyUr9dMAiw-8KANNdVAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:51.137037 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:56842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjy6TCbgAP5jq5TehCrwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:55.327310 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:56854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjzLysWC90G-1nBrBaEAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:56.764603 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:56870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj0I6lpbStxTqkSkuAfgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:58.063146 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:56878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj0o6lpbStxTqkSkuAgAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:59.248820 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:56892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj07ABkC4fWIHEf8ELHAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:00.653786 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:49524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj1I6lpbStxTqkSkuAhAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:01.933378 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:49532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj1bABkC4fWIHEf8ELHwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:03.133233 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:49538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj18_BxrYCr4hPDw8APwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:04.480200 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:49552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2FajLEzk2WiQ-10ouwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:05.656935 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:49566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2dSswJuvopo3lOh1AwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:06.975648 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:49572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2o6lpbStxTqkSkuAhQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:08.351814 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:49582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj3KQpVkWug9HeOt9LwAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:09.624898 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:49598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj3dSswJuvopo3lOh1BQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:11.042260 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:59654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj39SswJuvopo3lOh1BgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:12.277311 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:59662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj4NSswJuvopo3lOh1CAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:13.492678 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:59670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj4VajLEzk2WiQ-10ovQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:18.651318 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj5rABkC4fWIHEf8ELJgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:19.986557 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj5_9ocpUE4ed4uDwI1AAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:22.967629 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:47484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj6tSswJuvopo3lOh1DAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:24.449766 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:47500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj7Er9dMAiw-8KANNddQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:25.853830 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:47510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj7aTCbgAP5jq5TehCyQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:27.210990 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:47520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj70r9dMAiw-8KANNdeQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:28.527136 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:47534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj8LABkC4fWIHEf8ELKgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:29.937041 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:47546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj8bABkC4fWIHEf8ELKwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:31.186251 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.243.203:41572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj80r9dMAiw-8KANNdgQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:31.643111 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.228.16:51838] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhj87ABkC4fWIHEf8ELLAAAAEA"]
[Mon Mar 16 17:11:32.476423 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:41586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj9LysWC90G-1nBrBaGwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:34.754766 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:41602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj9s_BxrYCr4hPDw8ARQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:36.146273 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:41604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj-KQpVkWug9HeOt9LxAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:38.559531 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:41618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj-rysWC90G-1nBrBaHwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:40.348678 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_Er9dMAiw-8KANNdjAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:41.076423 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:41632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_Ur9dMAiw-8KANNdjQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:42.516699 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:40130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_rysWC90G-1nBrBaIwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:43.876325 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:40140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj__9ocpUE4ed4uDwI1QAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:45.045652 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:40148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkAf9ocpUE4ed4uDwI1wAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:46.435425 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:40156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkAqTCbgAP5jq5TehC3gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:48.995250 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkBP9ocpUE4ed4uDwI2gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:50.327881 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkBrABkC4fWIHEf8ELMwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:51.688197 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.243.203:33120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkB8_BxrYCr4hPDw8ASQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:52.986116 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:33126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkCFajLEzk2WiQ-10owwAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:54.382051 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:33136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkClajLEzk2WiQ-10oxQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:55.604605 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:33152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkC7ABkC4fWIHEf8ELNQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:56.966893 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:33154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkDEr9dMAiw-8KANNdlwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:58.165696 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:33170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkDqQpVkWug9HeOt9LyAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:00.199164 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:33178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkD7ABkC4fWIHEf8ELNgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:02.699092 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:42390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkEqQpVkWug9HeOt9LygAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:04.016465 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:42404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFP9ocpUE4ed4uDwI3AAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:05.264944 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:42414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFf9ocpUE4ed4uDwI3gAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:06.621210 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:42426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFv9ocpUE4ed4uDwI4gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:09.051691 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:42430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkGf9ocpUE4ed4uDwI5AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:12.842043 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkHKTCbgAP5jq5TehC9AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:14.193993 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:52154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkHqTCbgAP5jq5TehC9gAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:15.431281 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:52168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkH6TCbgAP5jq5TehC-AAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:24.699446 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:52180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkKI6lpbStxTqkSkuAnQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:26.019403 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:52326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkKqQpVkWug9HeOt9L2AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:27.220419 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:52330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkK0r9dMAiw-8KANNdmgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:30.953098 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:52342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkLtSswJuvopo3lOh1PAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:36.197835 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:37422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkMtSswJuvopo3lOh1QwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:37.578949 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:37436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkNf9ocpUE4ed4uDwI7AAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:38.827837 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkNrysWC90G-1nBrBaKQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:40.136482 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:37456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkOI6lpbStxTqkSkuAogAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:48.545546 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:55988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQKQpVkWug9HeOt9L4QAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:49.889892 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:55996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQf9ocpUE4ed4uDwI9QAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:51.245331 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:42350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQ46lpbStxTqkSkuAowAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:52.563370 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:42356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkRFajLEzk2WiQ-10o0gAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:53.971794 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:42362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkRc_BxrYCr4hPDw8AWQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:55.325210 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:42376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkR6QpVkWug9HeOt9L4gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:56.698672 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:42386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkSLysWC90G-1nBrBaKwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:57.878292 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:42402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkSY6lpbStxTqkSkuApQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:59.196533 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:42412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkS7ysWC90G-1nBrBaLAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:00.586400 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:47504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkTI6lpbStxTqkSkuApgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:01.808245 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:47512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkTbysWC90G-1nBrBaLQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:08.997294 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:47524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkVLABkC4fWIHEf8ELTQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:10.372460 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:57870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkVqTCbgAP5jq5TehDEQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:11.790110 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:57872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkV9SswJuvopo3lOh1YwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:14.109304 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:57884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkWaTCbgAP5jq5TehDEgAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:15.527507 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:57888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkW46lpbStxTqkSkuAqgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:17.570878 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkXM_BxrYCr4hPDw8AYgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:18.902196 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:57898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkXqQpVkWug9HeOt9L6AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:19.711501 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:53698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkX9SswJuvopo3lOh1aQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:20.247266 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:35790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkYLABkC4fWIHEf8ELTgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:21.595113 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:35796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkYf9ocpUE4ed4uDwI9wAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:23.891212 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:35810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkY8_BxrYCr4hPDw8AZAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:25.183278 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:35824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZaTCbgAP5jq5TehDGAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:26.511542 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:35840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZrysWC90G-1nBrBaNwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:27.842825 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZ46lpbStxTqkSkuArQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:28.998263 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:35860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkaI6lpbStxTqkSkuArgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:30.343515 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.243.203:32806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkas_BxrYCr4hPDw8AZwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:31.562800 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:32822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhka8_BxrYCr4hPDw8AaQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:33.002997 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:32830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkbdSswJuvopo3lOh1awAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:34.240803 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:32838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkbo6lpbStxTqkSkuAsAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:35.444850 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkb6QpVkWug9HeOt9L6wAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:36.750450 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:32860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkcLABkC4fWIHEf8ELXwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:37.960283 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:32874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkcVajLEzk2WiQ-10o3wAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:39.271214 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:32890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkc1ajLEzk2WiQ-10o4QAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:39.578331 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkc7ABkC4fWIHEf8ELYgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:40.477992 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:33100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkdKQpVkWug9HeOt9L7AAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:41.670807 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:33102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkdVajLEzk2WiQ-10o4gAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:43.015862 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkd7ABkC4fWIHEf8ELZAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:44.263123 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.243.203:33122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkeEr9dMAiw-8KANNdxwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:45.587211 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:33126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkebABkC4fWIHEf8ELZQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:46.455689 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:49318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkev9ocpUE4ed4uDwI_wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:48.017130 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkfLABkC4fWIHEf8ELZwAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:49.374127 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.243.203:33136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkfc_BxrYCr4hPDw8AagAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:54.390255 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:49322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkgrysWC90G-1nBrBaQAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:55.193079 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:34202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkg6QpVkWug9HeOt9L9QAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:57.804182 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:55016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkhaTCbgAP5jq5TehDIgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:01.939562 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:34218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkiaQpVkWug9HeOt9MAQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:14:07.651728 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:34104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkj0r9dMAiw-8KANNd4AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:14:09.013519 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:41754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkkUr9dMAiw-8KANNd4gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:14:14.409590 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:41760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhklv9ocpUE4ed4uDwJAwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:14:16.924798 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:41766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkmLysWC90G-1nBrBaUQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:21.579810 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:51238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhknbysWC90G-1nBrBaXAAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:46.107735 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:51252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkttSswJuvopo3lOh1igAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:53.823139 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.244.31:48362] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhkvVajLEzk2WiQ-10o8AAAAoM"]
[Mon Mar 16 17:15:57.031577 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:36378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhk_dSswJuvopo3lOh1ygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:16:04.070719 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:41418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlBP9ocpUE4ed4uDwJHwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:06.655215 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:41426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlBc_BxrYCr4hPDw8AjwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:16:12.011168 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:41438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlDKQpVkWug9HeOt9MJAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:32.688651 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:55852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlIEr9dMAiw-8KANNeOAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:37.401659 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:54248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlJNSswJuvopo3lOh10wAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:16:38.797670 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:54260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlJqQpVkWug9HeOt9MLAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:43.395444 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlK9SswJuvopo3lOh11gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:59.867771 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:43614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlO_9ocpUE4ed4uDwJQwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:03.602458 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlP9SswJuvopo3lOh2AgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:17:04.970451 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:34412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlQFajLEzk2WiQ-10pLwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:09.763412 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:34414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlRaTCbgAP5jq5TehDYwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:17:13.493505 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:47396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlSaTCbgAP5jq5TehDaQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:17:47.176062 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:55518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhla7ysWC90G-1nBrBbFAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:50.851896 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:47018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlblajLEzk2WiQ-10pWgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:17:55.959480 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:47034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlc6TCbgAP5jq5TehDeQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:04.527434 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:47036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlfLysWC90G-1nBrBbIQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:18:06.118477 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:42942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlfs_BxrYCr4hPDw8A2gAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:18:08.466286 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlgP9ocpUE4ed4uDwJXwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:24.271488 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:41804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlkEr9dMAiw-8KANNeVQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:40.675344 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhloKQpVkWug9HeOt9MXgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:44.375533 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:36372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlpI6lpbStxTqkSkuBSgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:48.019186 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:36376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlqLysWC90G-1nBrBbJwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:57.050965 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlsf9ocpUE4ed4uDwJjgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:19:09.335873 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:53202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlvaTCbgAP5jq5TehDiQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:19:38.991494 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:55862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl2o6lpbStxTqkSkuBYAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:19:50.955279 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:40894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl5lajLEzk2WiQ-10pjgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:19:55.378932 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.244.31:41010] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhl6s_BxrYCr4hPDw8BWgAAAcE"]
[Mon Mar 16 17:20:00.321317 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:51956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl8LABkC4fWIHEf8EL9gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:03.697475 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.243.203:35404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl80r9dMAiw-8KANNebQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:29.335698 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:60950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmDY6lpbStxTqkSkuBhAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:20:32.947292 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmEKTCbgAP5jq5TehDngAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:20:35.953622 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:34084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmE9SswJuvopo3lOh2PwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:58.561788 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:34094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmKv9ocpUE4ed4uDwJ8gAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:20:59.905560 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:49422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmK6QpVkWug9HeOt9MdQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:01.101119 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmLbABkC4fWIHEf8EMBAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:02.455674 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:49432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmLkr9dMAiw-8KANNehwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:06.898970 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:49448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmMtSswJuvopo3lOh2SgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:08.307969 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:58620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmNP9ocpUE4ed4uDwJ8wAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:09.574711 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:58624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmNbABkC4fWIHEf8EMBgAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:11.947024 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:58626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmN46lpbStxTqkSkuBjAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:14.053518 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:58636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmOrysWC90G-1nBrBbgwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:15.390462 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:58638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmO6QpVkWug9HeOt9MeAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:16.595708 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:58644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmPKTCbgAP5jq5TehDqAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:17.941089 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:58648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmPc_BxrYCr4hPDw8BjQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:19.311908 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmP0r9dMAiw-8KANNelAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:20.569785 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:52200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQNSswJuvopo3lOh2TAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:21.914807 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:52214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQbABkC4fWIHEf8EMCwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:23.094633 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:52228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQ1ajLEzk2WiQ-10pnAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:24.479586 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:52242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmRNSswJuvopo3lOh2TgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:28.043786 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:52244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmSNSswJuvopo3lOh2UgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:29.499523 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:58304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmSVajLEzk2WiQ-10pogAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:31.895856 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:58312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmS1ajLEzk2WiQ-10ppgAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:33.244988 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:58314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmTf9ocpUE4ed4uDwJ-AAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:35.663986 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:58324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmT9SswJuvopo3lOh2WwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:38.223191 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:58336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmUdSswJuvopo3lOh2XAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:39.793992 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:47350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmU0r9dMAiw-8KANNesQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:42.191010 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:47366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmVrysWC90G-1nBrBbnAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:43.635183 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:47368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmV1ajLEzk2WiQ-10ptAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:45.199453 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:47380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmWc_BxrYCr4hPDw8BnQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:46.482130 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:47394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmWo6lpbStxTqkSkuBjgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:47.900177 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:47398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmW6TCbgAP5jq5TehDrAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:49.151504 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:44814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmXY6lpbStxTqkSkuBkQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:52.715671 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:44818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmYKTCbgAP5jq5TehDsgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:54.019376 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:44824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmYv9ocpUE4ed4uDwJ-wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:55.422331 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmY9SswJuvopo3lOh2YAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:56.644897 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:44846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmZNSswJuvopo3lOh2YQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:59.495369 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:44856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmZ7ABkC4fWIHEf8EMEAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:01.162687 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:34852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmaY6lpbStxTqkSkuBlgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:02.356422 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:34856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmarABkC4fWIHEf8EMEQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:03.699538 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:34868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhma0r9dMAiw-8KANNe1gAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:04.885231 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:34874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmbKTCbgAP5jq5TehDtAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:08.394321 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:34890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmcNSswJuvopo3lOh2ZQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:09.844875 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:58070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmcbABkC4fWIHEf8EMEwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:11.034395 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:58082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmc8_BxrYCr4hPDw8BpQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:13.433602 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:58086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmdbysWC90G-1nBrBbuwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:15.822906 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:58094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmd0r9dMAiw-8KANNe6gAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:17.107183 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:58106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmeaQpVkWug9HeOt9MhgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:19.130151 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:48744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmev9ocpUE4ed4uDwKBAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:22.707050 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:48750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmfkr9dMAiw-8KANNe-AAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:23.991104 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:48764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmf7ABkC4fWIHEf8EMFwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:25.127596 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmgbABkC4fWIHEf8EMGQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:27.585251 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmg6QpVkWug9HeOt9MiAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:28.909288 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:52340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmhFajLEzk2WiQ-10pwgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:30.124282 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:52352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmhlajLEzk2WiQ-10pwwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:32.555917 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:52354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmiKTCbgAP5jq5TehDvQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:36.180898 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmjKTCbgAP5jq5TehDvwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:38.939743 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:52364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmjv9ocpUE4ed4uDwKCgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:40.329407 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:40252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmkFajLEzk2WiQ-10pxAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:43.787436 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:40268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmk1ajLEzk2WiQ-10pyAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:45.137333 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:40276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmlbABkC4fWIHEf8EMHwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:47.698696 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:40284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhml7ABkC4fWIHEf8EMIgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:23:44.113393 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:45934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm0LABkC4fWIHEf8EMYQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:03.646224 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:35098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm41ajLEzk2WiQ-10p6wAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:24:11.457425 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:54236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm6qTCbgAP5jq5TehD1AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:24:14.120916 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:35438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm7qTCbgAP5jq5TehD1gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:24:43.575918 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:35450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnC46lpbStxTqkSkuB1AAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:53.151343 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:49782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnFc_BxrYCr4hPDw8B4gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:54.557855 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:57490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnFtSswJuvopo3lOh2jgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:55.863117 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnF0r9dMAiw-8KANNfowAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:57.263213 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:57504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnGbABkC4fWIHEf8EMfAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:58.516675 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:52680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnGrABkC4fWIHEf8EMfQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:59.835167 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:52694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnG46lpbStxTqkSkuB1wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:01.046245 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:52710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnHVajLEzk2WiQ-10qHwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:06.178998 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:52724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnILysWC90G-1nBrBcLgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:08.031087 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:52738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJKTCbgAP5jq5TehD4AAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:10.402510 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:36136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJaTCbgAP5jq5TehD4QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:11.913838 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:36150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJ6TCbgAP5jq5TehD6AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:13.128267 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:36154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnKaTCbgAP5jq5TehD6QAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:14.444683 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:36170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnKqQpVkWug9HeOt9MtQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:16.086909 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:36184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnK6QpVkWug9HeOt9MtwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:17.472661 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:36196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnLaQpVkWug9HeOt9MugAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:18.754045 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:34952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnLrABkC4fWIHEf8EMhgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:21.234152 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:34962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnMLABkC4fWIHEf8EMhwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:22.639310 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:34972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnMs_BxrYCr4hPDw8B5wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:24.180016 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:34974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnNNSswJuvopo3lOh2lgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:25.554049 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:34986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnNbysWC90G-1nBrBcNQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:27.081406 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:34998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnN0r9dMAiw-8KANNfxwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:28.512748 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:35966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnOLABkC4fWIHEf8EMiQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:29.876169 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:35978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnObABkC4fWIHEf8EMiwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:31.223176 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:35980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnO1ajLEzk2WiQ-10qLQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:32.358707 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:35982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnPLABkC4fWIHEf8EMkQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:33.875684 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:35986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnPbABkC4fWIHEf8EMkgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:35.070516 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:35998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnP7ABkC4fWIHEf8EMlAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:36.431819 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:36002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQEr9dMAiw-8KANNf1QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:37.683578 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQdSswJuvopo3lOh2mwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:39.183381 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:36924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQ7ABkC4fWIHEf8EMmwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:41.570402 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:36934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnRKQpVkWug9HeOt9MwgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:43.173783 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:36948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnR6QpVkWug9HeOt9MxgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:44.553337 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:36956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnSEr9dMAiw-8KANNf4gAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:46.036009 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:36962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnSs_BxrYCr4hPDw8B7gAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:47.278596 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:36966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnS7ysWC90G-1nBrBcOgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:49.338140 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:40884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnTFajLEzk2WiQ-10qNgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:50.769793 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:40888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnTtSswJuvopo3lOh2oAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:52.088370 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:40892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnULysWC90G-1nBrBcPAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:54.453021 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:40900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnUdSswJuvopo3lOh2ogAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:55.955012 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:40914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnU6TCbgAP5jq5TehD-wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:57.195584 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnVc_BxrYCr4hPDw8B8wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:58.586136 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:39344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnVrysWC90G-1nBrBcPQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:00.758081 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnV6QpVkWug9HeOt9MzQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:02.051881 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:39374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnWqQpVkWug9HeOt9MzwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:03.292728 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:39388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnW6TCbgAP5jq5TehEAwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:04.725154 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:39402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnXLABkC4fWIHEf8EMowAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:05.943551 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:39414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnXaTCbgAP5jq5TehEBwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:07.230490 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:39420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnX6QpVkWug9HeOt9M0gAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:08.451473 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:56852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnYI6lpbStxTqkSkuB8AAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:09.867388 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:56860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnYbABkC4fWIHEf8EMpQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:13.364561 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:56866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnZc_BxrYCr4hPDw8CAAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:46.000559 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.228.16:60380] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhnhaTCbgAP5jq5TehEEQAAAsU"]
[Mon Mar 16 17:26:53.737193 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:56874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnjUr9dMAiw-8KANNgaAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:27:43.654529 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:57348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnv_9ocpUE4ed4uDwK4gAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:27:48.430259 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:35544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnxP9ocpUE4ed4uDwK6QAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:10.075462 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:41650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn2rABkC4fWIHEf8EM-QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:12.567111 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:49094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn3FajLEzk2WiQ-10qdwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:24.195443 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:49104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn51ajLEzk2WiQ-10qhQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:26.669827 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:42954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn6rABkC4fWIHEf8EM_wAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:28:30.151109 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:42962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn7kr9dMAiw-8KANNhFAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:33.404334 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:46570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn8aTCbgAP5jq5TehEOgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:39.138702 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:46576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn90r9dMAiw-8KANNhJQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:29:04.220121 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:52422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoEEr9dMAiw-8KANNhVAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:29:11.116360 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:35296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoF7ABkC4fWIHEf8ENFAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:29:13.530194 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:50814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoGdSswJuvopo3lOh29wAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:29:14.843067 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:50816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoGo6lpbStxTqkSkuCIgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:29:17.302553 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:50830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoHbABkC4fWIHEf8ENGAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:29:55.954882 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.244.31:53394] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhoQ_9ocpUE4ed4uDwK_wAAAgY"]
[Mon Mar 16 17:30:36.957314 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:43300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhobM_BxrYCr4hPDw8CkgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:30:38.467946 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:49382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhobtSswJuvopo3lOh3DwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:30:41.835255 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:49396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhocY6lpbStxTqkSkuCRwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:31:46.413416 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.228.16:36942] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhosqQpVkWug9HeOt9NQQAAA0U"]
[Mon Mar 16 17:31:47.520526 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:49406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhos7ABkC4fWIHEf8ENmwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:42.809328 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:44942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho6s_BxrYCr4hPDw8CtwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:32:49.826470 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:35404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho8c_BxrYCr4hPDw8CwgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:52.475505 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:47654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9LABkC4fWIHEf8EN1QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:53.966195 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:47664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9bABkC4fWIHEf8EN1wAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:32:54.728422 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9tSswJuvopo3lOh3WgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:57.319489 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:47672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-dSswJuvopo3lOh3XgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:58.364591 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:49766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-rysWC90G-1nBrBdCgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:59.931991 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:47680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-7ABkC4fWIHEf8EN4AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:09.742624 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpBbABkC4fWIHEf8EN8QAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:33:11.026968 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:43222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpB_9ocpUE4ed4uDwLsQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:12.247914 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:43230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpCP9ocpUE4ed4uDwLtAAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:29.465960 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:51748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpGf9ocpUE4ed4uDwLwgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:41.783979 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:41250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpJc_BxrYCr4hPDw8C2QAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:33:47.296205 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:47790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpK6TCbgAP5jq5TehEogAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:01.326967 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:60576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpOc_BxrYCr4hPDw8C4wAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:03.927866 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:54632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpO_9ocpUE4ed4uDwL1QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:05.239153 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:54642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpPY6lpbStxTqkSkuCgAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:06.445188 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:54656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpPkr9dMAiw-8KANNiCgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:11.117576 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:54668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpQ8_BxrYCr4hPDw8C6QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:22.130188 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:48268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpTo6lpbStxTqkSkuCkgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:23.498870 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:36518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpT6TCbgAP5jq5TehErgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:24.727240 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:36520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpULABkC4fWIHEf8EODwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:26.033346 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:36534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpUrABkC4fWIHEf8EOEQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:27.279093 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:36550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpU8_BxrYCr4hPDw8C8gAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:28.570997 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:46212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVM_BxrYCr4hPDw8C9gAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:29.756066 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:46228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVf9ocpUE4ed4uDwL1wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:30.935186 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVrysWC90G-1nBrBdXQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:32.234354 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:46232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpWI6lpbStxTqkSkuClAAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:34.971509 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:46240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpWrysWC90G-1nBrBdZgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:36.209819 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpXKTCbgAP5jq5TehEsQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:37.379487 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:46258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpXVajLEzk2WiQ-10q-QAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:40.494042 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:38472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpYFajLEzk2WiQ-10q_AAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:41.847599 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:38486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpYVajLEzk2WiQ-10q_QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:44.554191 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:38496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZP9ocpUE4ed4uDwL2gAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:45.910869 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:38510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZbABkC4fWIHEf8EOGAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:47.125927 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:38520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZ46lpbStxTqkSkuClwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:49.528647 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:34650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpaY6lpbStxTqkSkuCmQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:50.687318 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:34652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpakr9dMAiw-8KANNiMAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:51.965013 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:34660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpa9SswJuvopo3lOh3igAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:54.495590 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:34676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpbrABkC4fWIHEf8EOHAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:55.979561 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:60372] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhpb9SswJuvopo3lOh3jAAAAIw"]
[Mon Mar 16 17:35:00.926062 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:34690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpdKTCbgAP5jq5TehEuQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:02.424858 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:50626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpds_BxrYCr4hPDw8DAgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:03.599042 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:50630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpd6QpVkWug9HeOt9NagAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:04.948909 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:50632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpeNSswJuvopo3lOh3kgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:06.189619 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:50640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhperysWC90G-1nBrBdggAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:09.676818 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:50654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpfaQpVkWug9HeOt9NbQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:12.953027 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:36630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpgI6lpbStxTqkSkuCpgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:14.316954 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:36636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpgs_BxrYCr4hPDw8DBwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:17.623726 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:36638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhphc_BxrYCr4hPDw8DCwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:20.051133 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpiKTCbgAP5jq5TehEwgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:31.098497 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:55260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpk6TCbgAP5jq5TehEzgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:32.396700 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:32982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhplP9ocpUE4ed4uDwL4wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:35.784151 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:32996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpl7ABkC4fWIHEf8EOIAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:37.102157 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:32998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpmf9ocpUE4ed4uDwL5gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:38.263112 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:38712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpms_BxrYCr4hPDw8DEwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:39.571703 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:38726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpm1ajLEzk2WiQ-10rCwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:42.874978 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:38734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpnv9ocpUE4ed4uDwL7AAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:44.298389 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:38740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpoM_BxrYCr4hPDw8DFwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:45.481530 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:38742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpoUr9dMAiw-8KANNiWgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:46.749022 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:38750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpov9ocpUE4ed4uDwL7QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:50.742751 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:51658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpps_BxrYCr4hPDw8DHAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:53.511365 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:51662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpqdSswJuvopo3lOh3mgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:35:56.432201 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:60416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhprI6lpbStxTqkSkuC0QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:36:07.342347 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:51666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpt6QpVkWug9HeOt9NkQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:20.625553 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:57340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpxNSswJuvopo3lOh3rAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:22.952613 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:42684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpxrABkC4fWIHEf8EOLwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:33.688408 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp0VajLEzk2WiQ-10rRwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:36.707838 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:43820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp1LABkC4fWIHEf8EONQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:38.005156 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:43830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp1rysWC90G-1nBrBdlQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:40.275118 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp2I6lpbStxTqkSkuC_AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:46.442870 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.228.16:38906] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhp3qTCbgAP5jq5TehE3gAAAtg"]
[Mon Mar 16 17:36:55.203153 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:44636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp51ajLEzk2WiQ-10raQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:01.318652 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:54246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp7f9ocpUE4ed4uDwMBwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:02.708187 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp7rysWC90G-1nBrBdoAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:03.919514 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:54648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp746lpbStxTqkSkuDFQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:05.211720 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:54664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp8aTCbgAP5jq5TehE5AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:06.460981 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:54666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp8qTCbgAP5jq5TehE5gAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:07.754879 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:54678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp81ajLEzk2WiQ-10rdQAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:09.051055 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:38428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp9VajLEzk2WiQ-10reAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:14.654527 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:38434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp-v9ocpUE4ed4uDwMDAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:15.942070 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:38450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp-6QpVkWug9HeOt9NpAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:17.159113 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:38456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_c_BxrYCr4hPDw8DMwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:18.466392 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:55034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_qQpVkWug9HeOt9NpQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:19.663855 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:55036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_6QpVkWug9HeOt9NpgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:20.985668 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:55040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqAM_BxrYCr4hPDw8DNQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:22.534925 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:55052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqArysWC90G-1nBrBdpwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:25.007193 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:55060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqA0r9dMAiw-8KANNicgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:26.347561 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:55068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqBrysWC90G-1nBrBdqQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:27.535434 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqB9SswJuvopo3lOh3wgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:30.959946 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:57844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqCv9ocpUE4ed4uDwMFAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:34.450602 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:57856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqDaTCbgAP5jq5TehE-wAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:36.817788 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:57864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqEI6lpbStxTqkSkuDNQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:38.092328 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:47264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqErABkC4fWIHEf8EOUQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:41.527544 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:47274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqFbABkC4fWIHEf8EOVQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:42.818635 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:47290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqFtSswJuvopo3lOh3ywAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:47.593661 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:36482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqG46lpbStxTqkSkuDQAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:37:49.058106 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:47302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqHf9ocpUE4ed4uDwMHQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:52.655381 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:57226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqIKTCbgAP5jq5TehFAQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:57.258843 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:57230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqJc_BxrYCr4hPDw8DTwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:00.822811 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:48600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqKI6lpbStxTqkSkuDSgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:05.534410 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:48608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqLaTCbgAP5jq5TehFBQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:38:11.390181 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:48622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqM9SswJuvopo3lOh31QAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:12.714485 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:43658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqNNSswJuvopo3lOh31gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:30.930878 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:43660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqRqTCbgAP5jq5TehFHQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:32.252844 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:54546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqSP9ocpUE4ed4uDwMKgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:33.511629 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:54550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqSVajLEzk2WiQ-10rqAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:37.027777 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqTf9ocpUE4ed4uDwMMQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:38.355597 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:56646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqTqQpVkWug9HeOt9NwQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:39.542013 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:56650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqT_9ocpUE4ed4uDwMNAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:40.799280 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:56652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqUP9ocpUE4ed4uDwMNQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:41.935793 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:56666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqUdSswJuvopo3lOh33wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:43.226431 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:56678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqU1ajLEzk2WiQ-10rrQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:44.431084 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:56690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVLABkC4fWIHEf8EObgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:45.759787 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:56702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVbysWC90G-1nBrBdwQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:46.925253 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:56710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVqTCbgAP5jq5TehFHgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:49.300496 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:51692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqWdSswJuvopo3lOh35gAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:50.634746 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:51700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqWkr9dMAiw-8KANNiuQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:51.819106 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:51702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqW6TCbgAP5jq5TehFIQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:53.076096 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:51714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqXbysWC90G-1nBrBdwwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:54.232669 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:51730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqXrysWC90G-1nBrBdxAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:55.551358 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:51732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqX6TCbgAP5jq5TehFIgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:57.466981 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:51742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqYEr9dMAiw-8KANNiwAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:58.799716 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:45458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqYlajLEzk2WiQ-10rsAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:59.996587 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:45468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqY9SswJuvopo3lOh37AAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:01.368417 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZVajLEzk2WiQ-10rsQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:02.551040 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:45486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZqQpVkWug9HeOt9NxwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:03.825517 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:45502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZ7ysWC90G-1nBrBdyQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:08.888363 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:45514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqbI6lpbStxTqkSkuDWwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:18.834053 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:50284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqdo6lpbStxTqkSkuDZgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:39:28.816709 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:39766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqgNSswJuvopo3lOh3-wAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:30.135568 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:59604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqgo6lpbStxTqkSkuDZwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:31.268334 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:59618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqg7ysWC90G-1nBrBdzgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:32.571015 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:59622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhEr9dMAiw-8KANNi3wAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:33.721142 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:59626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhaTCbgAP5jq5TehFKgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:34.971048 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:59640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhqQpVkWug9HeOt9NzAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:36.840541 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:59648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqiLABkC4fWIHEf8EOfAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:37.997945 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:45596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqiVajLEzk2WiQ-10rygAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:39.260888 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:45608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqi1ajLEzk2WiQ-10rzgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:40.591041 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:45622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqjFajLEzk2WiQ-10r0QAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:41.902670 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:45630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqjbABkC4fWIHEf8EOfQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:43.084443 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:45642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqj7ABkC4fWIHEf8EOfgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:44.384576 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:45658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqkLABkC4fWIHEf8EOgAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:45.536647 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:45674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqkc_BxrYCr4hPDw8DrgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:47.868120 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:45676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqks_BxrYCr4hPDw8DsQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:49.230353 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:36998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqldSswJuvopo3lOh4BgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:50.579436 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:37012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqlrysWC90G-1nBrBd0gAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:51.737904 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:37024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhql6QpVkWug9HeOt9N0QAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:52.994239 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:37034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqmKQpVkWug9HeOt9N0gAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:54.240582 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:37038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqmkr9dMAiw-8KANNi8QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:56.218165 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.244.31:33792] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhqnLysWC90G-1nBrBd2QAAAYg"]
[Mon Mar 16 17:39:56.595224 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:37040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqnM_BxrYCr4hPDw8DvQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:57.893546 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:37042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqnaQpVkWug9HeOt9N1AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:59.088028 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:59094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqn8_BxrYCr4hPDw8DvgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:00.351587 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:59106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqoP9ocpUE4ed4uDwMWAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:01.946324 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:59120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqoUr9dMAiw-8KANNi9QAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:03.711068 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:59122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqo0r9dMAiw-8KANNi-AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:04.812466 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:59128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqpKTCbgAP5jq5TehFSAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:06.159813 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:59130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqps_BxrYCr4hPDw8DwgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:07.391585 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:59142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqp6QpVkWug9HeOt9N7AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:09.948336 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:57028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqqKQpVkWug9HeOt9N7gAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:11.268019 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:57030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqq6QpVkWug9HeOt9N8gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:12.448941 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:57036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqrI6lpbStxTqkSkuDbQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:13.690965 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:57052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqrdSswJuvopo3lOh4IAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:15.038963 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:57066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqr6QpVkWug9HeOt9N9QAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:16.196391 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:57080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsM_BxrYCr4hPDw8DwwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:17.494173 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:57096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsbysWC90G-1nBrBd5AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:18.702687 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:46904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsrABkC4fWIHEf8EOngAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:20.059973 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:46920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqtEr9dMAiw-8KANNi_QAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:21.275406 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:46924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqtaTCbgAP5jq5TehFUQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:22.584898 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:46936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqttSswJuvopo3lOh4KQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:23.838861 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:46944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqt0r9dMAiw-8KANNi_gAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:25.189807 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:46954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhquUr9dMAiw-8KANNi_wAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:26.355344 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:46960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqutSswJuvopo3lOh4LgAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:27.658532 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:46970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqu7ABkC4fWIHEf8EOpgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:28.875492 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:43556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqvFajLEzk2WiQ-10r3gAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:30.168299 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:43568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqvrysWC90G-1nBrBd6wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:32.232034 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:43572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqv0r9dMAiw-8KANNjAQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:42.291249 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:43576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqyrysWC90G-1nBrBd-AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:14.289917 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:55408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq6rysWC90G-1nBrBeHAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:41:34.220745 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:41214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq_s_BxrYCr4hPDw8D7wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:35.533852 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:57102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq_6TCbgAP5jq5TehFYwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:39.955289 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:57110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrA7ysWC90G-1nBrBeKwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:46.754736 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:58228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrCtSswJuvopo3lOh4mwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:48.058258 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:38974] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhrDNSswJuvopo3lOh4ngAAAIE"]
[Mon Mar 16 17:41:48.075080 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:58240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDKTCbgAP5jq5TehFZgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:49.247758 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:49078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDf9ocpUE4ed4uDwMkQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:50.541350 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:49082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDv9ocpUE4ed4uDwMkwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:52.963491 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrENSswJuvopo3lOh4rAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:54.255307 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrErABkC4fWIHEf8EO_QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:56.538000 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:49112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrE6QpVkWug9HeOt9OEwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:57.953201 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:49118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrFbABkC4fWIHEf8EPAgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:00.118932 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrGLABkC4fWIHEf8EPCgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:03.526088 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:53216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrGkr9dMAiw-8KANNjIwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:06.095611 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:53224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrHrABkC4fWIHEf8EPEAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:07.477332 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:53238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrH9SswJuvopo3lOh4uQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:10.023084 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:60854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrIrysWC90G-1nBrBeOgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:11.337231 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:60860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrI0r9dMAiw-8KANNjJwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:12.551431 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:60876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJM_BxrYCr4hPDw8D_gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:13.967066 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:60890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJaTCbgAP5jq5TehFcgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:15.206702 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJ7ABkC4fWIHEf8EPGgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:17.602524 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:60910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrKdSswJuvopo3lOh4xQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:19.929229 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:55178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrK6QpVkWug9HeOt9OHAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:21.244471 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:55182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrLbysWC90G-1nBrBeQgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:22.467456 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:55186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrLqTCbgAP5jq5TehFeAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:23.761467 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:55194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrL8_BxrYCr4hPDw8EAAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:24.991434 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:55196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrMLABkC4fWIHEf8EPJgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:26.310731 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:55202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrMo6lpbStxTqkSkuDkQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:27.505792 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:55218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrM7ysWC90G-1nBrBeRwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:28.774459 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:45750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrNI6lpbStxTqkSkuDkwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:34.300687 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:45756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrOrABkC4fWIHEf8EPKwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:42:38.040955 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:45760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrPlajLEzk2WiQ-10sGwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:39.388192 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:41522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrP9SswJuvopo3lOh44gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:40.584161 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:41536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrQLABkC4fWIHEf8EPLAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:59.535044 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:41548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrU0r9dMAiw-8KANNjQwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:43:01.964045 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:57110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrVVajLEzk2WiQ-10sOAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:43:13.208981 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:57112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrYf9ocpUE4ed4uDwMtgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:43:33.540057 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:58312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrdaQpVkWug9HeOt9OOAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:04.412063 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:36144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrlKQpVkWug9HeOt9OWQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:05.980941 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:59332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrlVajLEzk2WiQ-10scgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:18.238167 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:59336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrorysWC90G-1nBrBeaQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:21.664093 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:53052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrpbABkC4fWIHEf8EPTwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:23.013894 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:53062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrp6TCbgAP5jq5TehFlwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:27.601973 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:53078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrq46lpbStxTqkSkuDrQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:29.014409 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:51964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrrY6lpbStxTqkSkuDrgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:33.429070 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:51970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrsaTCbgAP5jq5TehFoAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:35.927152 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:51980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrs9SswJuvopo3lOh5RwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:38.596815 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:52446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrts_BxrYCr4hPDw8EVgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:39.515979 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:51994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrt0r9dMAiw-8KANNjWwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:39.961280 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:40558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrt7ysWC90G-1nBrBebAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:41.145425 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:59874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhruVajLEzk2WiQ-10slAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:43.099808 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:37090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhru1ajLEzk2WiQ-10smgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:44.455468 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:37098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvP9ocpUE4ed4uDwM1gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:45.669499 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:37104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvdSswJuvopo3lOh5TAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:46.971617 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:37120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvrABkC4fWIHEf8EPUAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:49.331607 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:46044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrwbABkC4fWIHEf8EPUwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:54.427885 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:46060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrxrABkC4fWIHEf8EPVwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:56.803083 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.244.31:59834] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhryFajLEzk2WiQ-10srgAAApY"]
[Mon Mar 16 17:44:58.007471 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:46068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrytSswJuvopo3lOh5VAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:59.844851 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:48550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhry46lpbStxTqkSkuDuwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:01.237191 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:48560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrzaTCbgAP5jq5TehFqAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:06.799819 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:48564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr0tSswJuvopo3lOh5WwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:08.146612 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:39232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr1LABkC4fWIHEf8EPXQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:14.587466 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:39242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr2o6lpbStxTqkSkuDxgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:16.714519 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr29SswJuvopo3lOh5YgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:20.407448 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:49154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr4KTCbgAP5jq5TehFtAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:21.710973 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:49164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr4Ur9dMAiw-8KANNjawAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:23.916152 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:49180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr47ABkC4fWIHEf8EPYwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:29.930559 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:49190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr6Ur9dMAiw-8KANNjbwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:32.309114 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:41058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr7KQpVkWug9HeOt9OZwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:33.602964 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:41066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr7bABkC4fWIHEf8EPZQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:40.398347 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:59880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9LysWC90G-1nBrBeqgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:40.412305 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:41076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9LABkC4fWIHEf8EPawAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:42.827115 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:34342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9lajLEzk2WiQ-10s0wAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:45.255278 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:34350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr-f9ocpUE4ed4uDwM7wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:46.598983 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:34354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr-qQpVkWug9HeOt9OaQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:48.855768 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:34362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr_P9ocpUE4ed4uDwM8QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:51.767507 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:42096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr_7ysWC90G-1nBrBetwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:45:54.948574 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:33122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsArABkC4fWIHEf8EPcAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:57.425698 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:33128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsBbABkC4fWIHEf8EPcwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:59.010495 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:37130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsB9SswJuvopo3lOh5dAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:03.295060 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:37406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsCaTCbgAP5jq5TehFxgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:03.296071 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:37146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsClajLEzk2WiQ-10s5wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:05.765982 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:37150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsDaQpVkWug9HeOt9ObQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:07.098175 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:37164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsD7ABkC4fWIHEf8EPdwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:07.962752 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:60300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsD6TCbgAP5jq5TehFygAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:08.287115 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:38346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsELABkC4fWIHEf8EPegAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:14.039087 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:38350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsFrABkC4fWIHEf8EPigAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:18.919938 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:38352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsGkr9dMAiw-8KANNjgAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:20.339268 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:39726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsHKQpVkWug9HeOt9OcAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:23.887050 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:39736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsH9SswJuvopo3lOh5eQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:48.210128 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:47602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhsONSswJuvopo3lOh5fwAAAIE"]
[Mon Mar 16 17:47:00.232286 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:39742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsRLABkC4fWIHEf8EP6gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:47:03.866455 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:59976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsR7ABkC4fWIHEf8EP8wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:47:19.710628 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:60310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsV7ABkC4fWIHEf8EQEwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:15.110477 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:50926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsj7ysWC90G-1nBrBfNQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:24.285020 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:59986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsmLysWC90G-1nBrBfQAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:48:25.577943 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:56884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsmf9ocpUE4ed4uDwNBwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:35.876358 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:56894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhso9SswJuvopo3lOh5mgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:45.040972 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:42640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsrbABkC4fWIHEf8EQegAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:48.479627 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:40444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhssEr9dMAiw-8KANNjiQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:59.963016 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:37984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsu_9ocpUE4ed4uDwNIwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:49:10.184902 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:51316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsxkr9dMAiw-8KANNjkgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:49:13.683255 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:51428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsydSswJuvopo3lOh5tAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:49:16.158810 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:51432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhszLysWC90G-1nBrBfRgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:50:06.708106 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:51434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhs_s_BxrYCr4hPDw8ElgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:50:12.178507 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:55610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtBLysWC90G-1nBrBfUwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:50:18.687145 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtCrysWC90G-1nBrBfWgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:25.297945 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:43502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtEaTCbgAP5jq5TehF7gAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:39.454457 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:43504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtH7ABkC4fWIHEf8EQtwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:47.298471 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:34336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtJ7ABkC4fWIHEf8EQvQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:51:10.261580 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:40910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtPrABkC4fWIHEf8EQ1gAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:51:17.921268 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:41086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtRdSswJuvopo3lOh6QAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:51:49.263257 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.228.16:34960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhtZf9ocpUE4ed4uDwNmAAAAhQ"]
[Mon Mar 16 17:52:24.719837 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:56412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtiM_BxrYCr4hPDw8FNQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:52:35.095481 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtk9SswJuvopo3lOh6lAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:53:02.314120 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtro6lpbStxTqkSkuEIgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:53:32.183453 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:37870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtzP9ocpUE4ed4uDwN9wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:53:35.607804 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:60334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtz46lpbStxTqkSkuEKwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:53:40.659008 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:60336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht1KTCbgAP5jq5TehGLAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:53:46.034998 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:55326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht2rysWC90G-1nBrBfoQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:02.173438 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:36340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht6s_BxrYCr4hPDw8FoAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:03.533770 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:34876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht67ysWC90G-1nBrBfowAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:24.242947 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:34890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuAKTCbgAP5jq5TehGTgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:25.582742 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:47034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuAaQpVkWug9HeOt9OwgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:37.021489 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:47042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuDaTCbgAP5jq5TehGXQAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:38.350027 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:33524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuDtSswJuvopo3lOh6pgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:54:49.373488 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:33534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuGbysWC90G-1nBrBfsQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:58.007570 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:42438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuIrysWC90G-1nBrBfuQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:58.342743 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.244.31:44482] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhuIv9ocpUE4ed4uDwOawAAAgE"]
[Mon Mar 16 17:55:01.449397 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:34518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuJc_BxrYCr4hPDw8FrgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:06.270937 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:34528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuKo6lpbStxTqkSkuENQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:55:13.465585 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:34530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuMaQpVkWug9HeOt9OzAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:25.028039 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuPbABkC4fWIHEf8ERYwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:55:26.433191 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:44966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuPrABkC4fWIHEf8ERZQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:55:27.595608 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:44980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuP6TCbgAP5jq5TehGZwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:29.696143 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:51830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuQbABkC4fWIHEf8ERaQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 17:55:30.047891 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:48760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuQs_BxrYCr4hPDw8FsgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:55:44.598561 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:38100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuUKQpVkWug9HeOt9O4QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 17:56:36.270367 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:39782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuhLABkC4fWIHEf8ERmAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:56:42.729859 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:48772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuilajLEzk2WiQ-10twgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:56:50.823917 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.228.16:45096] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhukv9ocpUE4ed4uDwOrwAAAhA"]
[Mon Mar 16 17:57:03.832277 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:44804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhun8_BxrYCr4hPDw8FzgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:20.480160 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:52014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhusFajLEzk2WiQ-10t0QAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:36.710977 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:49430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuwLABkC4fWIHEf8ERtAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:37.991608 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:54402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuwdSswJuvopo3lOh7DAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:39.151306 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:49424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuw7ABkC4fWIHEf8ERtgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:43.484502 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhux7ABkC4fWIHEf8ERuQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:43.817378 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:43960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhux46lpbStxTqkSkuEgwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:47.390764 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:49442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuy46lpbStxTqkSkuEhQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:48.702423 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:59316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuzKQpVkWug9HeOt9O8QAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:51.860224 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:59324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuz6TCbgAP5jq5TehGeQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:55.295818 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:59338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu046lpbStxTqkSkuEiAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:58.603281 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:59348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu1qTCbgAP5jq5TehGfQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:02.028598 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:45894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu2rABkC4fWIHEf8ERzAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:03.419272 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:45900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu20r9dMAiw-8KANNj4gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:04.504909 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:45914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3KTCbgAP5jq5TehGfgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:05.778676 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:56934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3bABkC4fWIHEf8ER0AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:58:05.867455 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:45918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3f9ocpUE4ed4uDwOuAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:07.058845 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:45934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu36TCbgAP5jq5TehGfwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:08.247566 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:47908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4M_BxrYCr4hPDw8F0wAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:09.559800 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:47918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4aTCbgAP5jq5TehGggAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:10.765800 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:47934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4o6lpbStxTqkSkuEiwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:12.041219 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:47940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5P9ocpUE4ed4uDwOuQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:13.258014 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:47952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5f9ocpUE4ed4uDwOugAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:14.595461 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:47958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5qQpVkWug9HeOt9O9wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:15.779459 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:47966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5_9ocpUE4ed4uDwOvAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:15.816611 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:46950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu57ysWC90G-1nBrBf4wAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:17.100956 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:47976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu6VajLEzk2WiQ-10t2AAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:18.319205 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:43896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu6qTCbgAP5jq5TehGjwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:20.034939 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:43912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu646lpbStxTqkSkuEjgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:21.255145 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:43918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu7Ur9dMAiw-8KANNj8AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:22.564662 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:43920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu7tSswJuvopo3lOh7JgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:23.773953 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:43928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu76QpVkWug9HeOt9O-AAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:27.490738 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:43930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu8bysWC90G-1nBrBf5wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:28.763520 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:39590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu9I6lpbStxTqkSkuEjwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:29.869683 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:39592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu9c_BxrYCr4hPDw8F1gAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:37.633989 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:39594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu_aQpVkWug9HeOt9PAwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:58:45.487359 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:53508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvBbABkC4fWIHEf8ER2gAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:58:50.331106 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:53516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvCrABkC4fWIHEf8ER4AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:05.407574 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:35100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvGaTCbgAP5jq5TehG3AAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:05.751236 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:43958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvGf9ocpUE4ed4uDwO1AAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:08.218506 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:32922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvHLysWC90G-1nBrBf-wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:12.980830 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:40752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvIM_BxrYCr4hPDw8F5gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:14.294906 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:40754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvIqTCbgAP5jq5TehG7AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:59:23.958859 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:40760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvK46lpbStxTqkSkuEqAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:29.597095 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:35994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvMaQpVkWug9HeOt9PDQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:36.280022 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvOP9ocpUE4ed4uDwO2gAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:42.951619 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:50218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvPkr9dMAiw-8KANNkFwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:58.430797 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.244.31:58954] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhvTlajLEzk2WiQ-10t5gAAApI"]
[Mon Mar 16 17:59:58.819548 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvTkr9dMAiw-8KANNkJQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:01.439596 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:58052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvUf9ocpUE4ed4uDwO3QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:06.155454 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:58054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvVlajLEzk2WiQ-10t6wAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:08.599239 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:58056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvWKQpVkWug9HeOt9PEwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:00:14.995684 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:56142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvXqTCbgAP5jq5TehHVwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:21.592571 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvZVajLEzk2WiQ-10t_AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:08.009040 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:37208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlFajLEzk2WiQ-10uKQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:09.598588 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:51872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlVajLEzk2WiQ-10uKwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:10.930213 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:33618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlqTCbgAP5jq5TehHaQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:12.183238 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:33624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmLysWC90G-1nBrBgEQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:13.420297 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:33636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmaTCbgAP5jq5TehHagAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:14.752475 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmqTCbgAP5jq5TehHbAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:15.919733 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:33644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvm7ysWC90G-1nBrBgEgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:17.299028 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:33658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvnbysWC90G-1nBrBgEwAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:19.185443 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:33674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvntSswJuvopo3lOh7UgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:20.726894 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:36632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvoKTCbgAP5jq5TehHbQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:21.861916 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:36648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvodSswJuvopo3lOh7UwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:23.155131 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:36660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvo_9ocpUE4ed4uDwPDQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:24.333611 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:36668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvpLABkC4fWIHEf8ER_AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:25.620775 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:36678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvpY6lpbStxTqkSkuEugAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:26.826409 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:36686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvprysWC90G-1nBrBgFQAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:27.999001 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:36690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvp8_BxrYCr4hPDw8F9QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:29.179263 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.243.203:36702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvqc_BxrYCr4hPDw8F9gAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:30.514079 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:59542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvqqTCbgAP5jq5TehHbwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:31.728636 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:59554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvq6TCbgAP5jq5TehHcAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:33.057593 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvrbABkC4fWIHEf8ESAAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:34.230378 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:59568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvrtSswJuvopo3lOh7VAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:35.576211 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:59574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvr7ysWC90G-1nBrBgFgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:36.759696 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:59590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvsM_BxrYCr4hPDw8F9wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:38.031603 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:59598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvsqQpVkWug9HeOt9PXQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:39.301597 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:59604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvs7ABkC4fWIHEf8ESAQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:40.457302 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:49596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvtLABkC4fWIHEf8ESAgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:42.797805 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:49600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvtrABkC4fWIHEf8ESBgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:44.087927 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:49610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvuLABkC4fWIHEf8ESBwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:45.257072 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:49620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvuUr9dMAiw-8KANNkNgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:46.559271 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:49630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvutSswJuvopo3lOh7VQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:47.715921 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:49632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvu7ysWC90G-1nBrBgFwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:49.024209 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:49646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvvaTCbgAP5jq5TehHcQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:50.224402 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:45394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvvrABkC4fWIHEf8ESCAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:50.852353 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:49378] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhvvrABkC4fWIHEf8ESCQAAAEk"]
[Mon Mar 16 18:01:51.531548 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:45400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvv46lpbStxTqkSkuEvQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:52.808306 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.243.203:45404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvwM_BxrYCr4hPDw8F-AAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:00.284675 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:45406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvyLABkC4fWIHEf8ESEQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:01.580340 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:57236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvyf9ocpUE4ed4uDwPLQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:03.317976 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:57248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvy8_BxrYCr4hPDw8F-wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:04.434910 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.243.203:57258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzEr9dMAiw-8KANNkOAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:05.767002 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:57264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzbysWC90G-1nBrBgGQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:06.929569 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:57280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzo6lpbStxTqkSkuEvwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:17.174959 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:57290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv2bysWC90G-1nBrBgIQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:18.505088 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv2qTCbgAP5jq5TehHdAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:19.677153 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:57668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv26QpVkWug9HeOt9PhgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:20.954491 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:46564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv3FajLEzk2WiQ-10uMgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:22.164573 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:46574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv3kr9dMAiw-8KANNkOwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:23.347010 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:46580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv36TCbgAP5jq5TehHdgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:24.688629 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:46588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv4Er9dMAiw-8KANNkPQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:26.532549 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:46602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv4qTCbgAP5jq5TehHdwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:27.860074 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:46614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv446lpbStxTqkSkuEwAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:29.231579 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:46620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv5aTCbgAP5jq5TehHeAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:30.378758 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:43506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv5kr9dMAiw-8KANNkPgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:31.633096 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:43516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv58_BxrYCr4hPDw8F_gAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:46.255339 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:45410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv9tSswJuvopo3lOh7cAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:02:58.685355 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:52916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwAqTCbgAP5jq5TehHiAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:03:10.317173 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:53282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwDo6lpbStxTqkSkuE0AAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:20.303007 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwGEr9dMAiw-8KANNkeAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:23.744384 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:57432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwG46lpbStxTqkSkuE1wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:27.439548 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:57438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwH46lpbStxTqkSkuE2wAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:44.007693 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:47084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwMLysWC90G-1nBrBgZwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:03:49.151561 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:50244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwNaTCbgAP5jq5TehHlQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:03:54.114498 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:50180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwOLABkC4fWIHEf8ESIgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:04:22.870942 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:50196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwVkr9dMAiw-8KANNk0gAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:57.633129 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:39016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwebysWC90G-1nBrBgwAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:58.915912 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:51950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhweqQpVkWug9HeOt9PlQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:59.138883 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:49678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhwe46lpbStxTqkSkuE6QAAAkw"]
[Mon Mar 16 18:05:04.135430 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:51958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwgKTCbgAP5jq5TehHowAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:22.590052 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:51970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwkrABkC4fWIHEf8EScQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:27.122906 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:50274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwl9SswJuvopo3lOh7nAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:52.160309 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:56452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwr9SswJuvopo3lOh7xwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:06:49.931564 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:55852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw6dSswJuvopo3lOh8PwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:06:51.220898 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.228.16:57068] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhw66TCbgAP5jq5TehHrwAAAsk"]
[Mon Mar 16 18:06:56.848970 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:35586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw8I6lpbStxTqkSkuE-wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:06:58.188457 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:54376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw8s_BxrYCr4hPDw8GJwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:06:59.362814 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:54382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw87ysWC90G-1nBrBg1QAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:00.765792 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:54386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw9KQpVkWug9HeOt9PpgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:01.939184 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw9bysWC90G-1nBrBg1wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:03.272813 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:54404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw90r9dMAiw-8KANNk5wAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:04.458490 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:54412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-LABkC4fWIHEf8ES8AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:05.831423 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:54414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-c_BxrYCr4hPDw8GKAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:06.980775 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:54430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-s_BxrYCr4hPDw8GKQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:08.346140 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:59896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_Er9dMAiw-8KANNk6QAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:09.518205 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:59908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_bysWC90G-1nBrBg2AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:10.779018 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:59914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_kr9dMAiw-8KANNk6gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:11.998210 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:59924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_8_BxrYCr4hPDw8GLAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:14.461256 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:59928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxAaQpVkWug9HeOt9PpwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:15.789609 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:59942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxA1ajLEzk2WiQ-10uZAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:16.963237 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:59956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxBLABkC4fWIHEf8ETAwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:18.253667 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:42550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxBlajLEzk2WiQ-10uZwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:19.418850 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:42556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxB9SswJuvopo3lOh8WAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:20.713609 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:42570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxCI6lpbStxTqkSkuE_gAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:21.948643 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:42580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxCaQpVkWug9HeOt9PqAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:23.240622 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxC_9ocpUE4ed4uDwPaAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:24.402342 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:42584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDFajLEzk2WiQ-10uaAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:25.706160 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:42594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDVajLEzk2WiQ-10uawAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:26.835304 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:42608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDkr9dMAiw-8KANNk7AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:28.206195 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:60356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEKTCbgAP5jq5TehHtQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:29.480316 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:60372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEc_BxrYCr4hPDw8GLgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:30.772176 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:60378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEo6lpbStxTqkSkuFAAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:31.894405 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:60384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxE9SswJuvopo3lOh8WgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:34.166108 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:60388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxFv9ocpUE4ed4uDwPagAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:35.469483 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:60400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxF46lpbStxTqkSkuFAQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:37.878488 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:60416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxGaQpVkWug9HeOt9PrAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:40.215553 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:52026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxHKTCbgAP5jq5TehHuQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:46.019643 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:52040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxIrABkC4fWIHEf8ETQwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:48.439369 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:52044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxJNSswJuvopo3lOh8XgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:51.995594 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:56570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxJ6QpVkWug9HeOt9PsAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:55.680423 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:56586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxK9SswJuvopo3lOh8YQAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:11.859814 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:35412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxO1ajLEzk2WiQ-10ufQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:08:48.467154 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:55610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxYM_BxrYCr4hPDw8GWQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:48.542240 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:44822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxYKTCbgAP5jq5TehHygAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:53.904930 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:49348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxZUr9dMAiw-8KANNk_AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:53.905232 2026] [mime_magic:error] [pid 29507:tid 140411540502272] (70014)End of file found: [client 74.7.243.203:49348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:02.542491 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:50254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxbqQpVkWug9HeOt9PzwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:09:09.249476 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:43206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxdaTCbgAP5jq5TehH1AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:10.600366 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:53576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxdrABkC4fWIHEf8ETyQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:11.786143 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:53592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxd0r9dMAiw-8KANNlAAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:13.128239 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:53606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxedSswJuvopo3lOh8bgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:14.342990 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:53614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxetSswJuvopo3lOh8cAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:15.657062 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:53624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxe9SswJuvopo3lOh8cQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:17.022806 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:53636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxfbysWC90G-1nBrBg7AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:21.405901 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:37488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxgf9ocpUE4ed4uDwPgwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:23.779097 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:37496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxg46lpbStxTqkSkuFCwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:25.108069 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:37512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxhVajLEzk2WiQ-10uiAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:27.351628 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:37522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxh46lpbStxTqkSkuFDwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:29.736107 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:53892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxibABkC4fWIHEf8ET0AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:32.207236 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:53896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxjLysWC90G-1nBrBg8AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:33.512829 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxjaTCbgAP5jq5TehH1QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:40.568807 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:53910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxlM_BxrYCr4hPDw8GZwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:45.100797 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:41246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxmVajLEzk2WiQ-10ukAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:46.364743 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxmv9ocpUE4ed4uDwPiAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:47.600806 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxm7ysWC90G-1nBrBg8wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:52.358365 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:52590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxn7ysWC90G-1nBrBg9gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:53.705037 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxoUr9dMAiw-8KANNlCQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:59.022498 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:49246] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhxp7ABkC4fWIHEf8ET1AAAAFg"]
[Mon Mar 16 18:10:06.507372 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:52596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxrrysWC90G-1nBrBhAwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:08.662931 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:41856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxr6TCbgAP5jq5TehH2QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:09.953409 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:46358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxsf9ocpUE4ed4uDwPkwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:13.287566 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:46374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxtY6lpbStxTqkSkuFFgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:14.582914 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:46390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxtkr9dMAiw-8KANNlCwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:15.750261 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:46394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxt9SswJuvopo3lOh8qAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:20.472688 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:46404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxvP9ocpUE4ed4uDwPmgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:21.762691 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:43612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxvf9ocpUE4ed4uDwPnQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:23.665215 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:49596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxv6QpVkWug9HeOt9QHQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:28.000643 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:43620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxw1ajLEzk2WiQ-10umAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:30.223329 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:57406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxxtSswJuvopo3lOh8uQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:35.715522 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:47010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxy7ysWC90G-1nBrBhDgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:42.801819 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:47026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx0lajLEzk2WiQ-10uoAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:50.775297 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:44402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx2tSswJuvopo3lOh82gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:55.402900 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:56442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx30r9dMAiw-8KANNlKQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:01.022591 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx5bysWC90G-1nBrBhFAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:02.329507 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:46636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx5s_BxrYCr4hPDw8GewAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:03.543053 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:46638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx57ABkC4fWIHEf8ET4gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:06.100205 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:49516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx6kr9dMAiw-8KANNlNAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:07.067516 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:46654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx6_9ocpUE4ed4uDwPpgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:08.358468 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:45706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx7P9ocpUE4ed4uDwPqQAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:11.731751 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:45712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx77ABkC4fWIHEf8ET6QAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:20.928144 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:45716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx-LABkC4fWIHEf8ET8QAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:30.856341 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:51096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyAo6lpbStxTqkSkuFLwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:32.213251 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:34048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBKQpVkWug9HeOt9QIAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:33.338179 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:34054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBc_BxrYCr4hPDw8GgwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:34.596305 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:34056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBrABkC4fWIHEf8ET9AAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:35.769633 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:34072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyB6QpVkWug9HeOt9QIQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:38.459732 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:34080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyCbABkC4fWIHEf8ET9gAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:39.747709 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:35306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyC9SswJuvopo3lOh9BgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:40.935471 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDEr9dMAiw-8KANNlNgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:41.167120 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:35316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDUr9dMAiw-8KANNlNwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:42.490945 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:35330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDrysWC90G-1nBrBhHgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:44.955412 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:35336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyEP9ocpUE4ed4uDwP3QAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:46.255000 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:35352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyEqQpVkWug9HeOt9QJAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:47.396039 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:35362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyE7ysWC90G-1nBrBhIQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:48.711632 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:55688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyFP9ocpUE4ed4uDwP4gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:49.880428 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:55702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyFf9ocpUE4ed4uDwP5QAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:51.226363 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:55710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyF46lpbStxTqkSkuFRgAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:51.227199 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.228.16:33156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhyF6TCbgAP5jq5TehH7wAAAsc"]
[Mon Mar 16 18:11:52.410437 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyGNSswJuvopo3lOh9CAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:54.668930 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:55722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyGc_BxrYCr4hPDw8GhwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:57.071022 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:55724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyHVajLEzk2WiQ-10urAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:59.463616 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:43938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyH9SswJuvopo3lOh9DAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:00.784511 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:43950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyIM_BxrYCr4hPDw8GiAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:01.931352 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:43966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyIVajLEzk2WiQ-10urgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:03.205219 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:43978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyI9SswJuvopo3lOh9DQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:04.413078 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:43980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJI6lpbStxTqkSkuFUAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:05.603597 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJY6lpbStxTqkSkuFUgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:06.932777 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:44010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJqQpVkWug9HeOt9QKQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:08.083080 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:56836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKM_BxrYCr4hPDw8GjAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:09.481677 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:56844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKaTCbgAP5jq5TehH8QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:10.735663 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:56848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKrABkC4fWIHEf8ET_wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:12.026176 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:56850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLLysWC90G-1nBrBhJwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:13.219189 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:56854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLc_BxrYCr4hPDw8GkgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:14.605066 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:56866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLrABkC4fWIHEf8EUAwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:15.804385 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:56882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyL7ABkC4fWIHEf8EUBgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:19.420030 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:56886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyM8_BxrYCr4hPDw8GlQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:20.806314 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:51418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNKTCbgAP5jq5TehH9AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:22.039810 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:51430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNqTCbgAP5jq5TehH9QAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:22.800158 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:45552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNv9ocpUE4ed4uDwQBQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:23.348866 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:51438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyN7ysWC90G-1nBrBhKAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:25.130950 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.243.203:40846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOUr9dMAiw-8KANNlQAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:26.427485 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:40862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOkr9dMAiw-8KANNlQQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:26.839249 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:51450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOlajLEzk2WiQ-10usgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:28.135204 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:40422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyPNSswJuvopo3lOh9FAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:31.575256 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:40428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyP_9ocpUE4ed4uDwQDAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:32.911489 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:40442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyQLABkC4fWIHEf8EUEQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:36.272059 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:40450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyRP9ocpUE4ed4uDwQEwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:45.515252 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:40464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyTUr9dMAiw-8KANNlUQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:46.801446 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:60700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyTrABkC4fWIHEf8EUEgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:47.987460 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:57874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyT0r9dMAiw-8KANNlUgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:50.448573 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:57888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyUlajLEzk2WiQ-10utgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:02.539194 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:57900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyXv9ocpUE4ed4uDwQOwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:04.890997 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:47856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyYKTCbgAP5jq5TehH_QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:06.132605 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:47866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyYrABkC4fWIHEf8EUGAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:07.306434 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:47870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyY6TCbgAP5jq5TehH_gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:09.675462 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyZaTCbgAP5jq5TehIAAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:10.951233 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:33392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyZkr9dMAiw-8KANNlWAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:12.160220 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:33404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyaNSswJuvopo3lOh9IQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:13.332582 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyaf9ocpUE4ed4uDwQRgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:15.500271 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhya1ajLEzk2WiQ-10uvwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:16.884080 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:33428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhybEr9dMAiw-8KANNlXQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:18.116467 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:46652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhybqQpVkWug9HeOt9QPQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:26.136709 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:46660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhydtSswJuvopo3lOh9LgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:14:26.775446 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyso6lpbStxTqkSkuF3QAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:28.089696 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:39222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhytLysWC90G-1nBrBhRgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:30.407332 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:39226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyttSswJuvopo3lOh9WwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:58.612293 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:51170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy0s_BxrYCr4hPDw8HEAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:14:59.972342 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.244.31:57948] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhy07ysWC90G-1nBrBhSQAAAYg"]
[Mon Mar 16 18:15:06.839447 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:39242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy2tSswJuvopo3lOh9jAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:08.166597 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:56582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy3I6lpbStxTqkSkuF4QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:09.057035 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:49292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy3dSswJuvopo3lOh9jwAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:13.719587 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:51900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy4bysWC90G-1nBrBhUwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:14.915977 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:56588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy4rysWC90G-1nBrBhVAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:15:24.121135 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:56604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7I6lpbStxTqkSkuF6wAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:25.511546 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:37072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7Ur9dMAiw-8KANNlfAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:26.703260 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:37082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7v9ocpUE4ed4uDwQaAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:28.011763 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:37092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8Er9dMAiw-8KANNlfQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:29.216088 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:42116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8Ur9dMAiw-8KANNlfwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:30.509490 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:42118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8o6lpbStxTqkSkuF7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:36.192589 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:42124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-KTCbgAP5jq5TehIIwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:37.657501 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:42132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-dSswJuvopo3lOh9kQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:38.828824 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:53548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-kr9dMAiw-8KANNlggAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:41.267576 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:53558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy_aQpVkWug9HeOt9QaQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:44.987196 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:53574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzAP9ocpUE4ed4uDwQcQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:47.447785 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:53576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzA8_BxrYCr4hPDw8HFgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:48.813033 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:47360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzBP9ocpUE4ed4uDwQdAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:51.067476 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:47374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzB6TCbgAP5jq5TehILAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:52.396934 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:47390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzCLysWC90G-1nBrBhXgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:53.695909 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:47400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzCY6lpbStxTqkSkuF8AAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:54.461607 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzClajLEzk2WiQ-10u_gAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:55.007139 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:47416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzC6QpVkWug9HeOt9QbwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:55.770827 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:40766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzC6QpVkWug9HeOt9QcAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:58.476493 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:47420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzDo6lpbStxTqkSkuF8wAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:59.215351 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:40782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzD_9ocpUE4ed4uDwQfgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:15:59.811139 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:39670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzD1ajLEzk2WiQ-10u_wAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:02.423826 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzEtSswJuvopo3lOh9mwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:04.819860 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:39692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzFFajLEzk2WiQ-10vCQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:06.147385 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:39698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzFtSswJuvopo3lOh9ngAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:08.480096 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:39700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzGKTCbgAP5jq5TehIPQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:09.836656 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:54644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzGaQpVkWug9HeOt9QcQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:11.087369 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:54646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzG0r9dMAiw-8KANNlkgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:12.403516 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:54658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHI6lpbStxTqkSkuF9gAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:13.606880 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHbABkC4fWIHEf8EUxgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:14.891314 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHrysWC90G-1nBrBhZQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:17.065308 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzIc_BxrYCr4hPDw8HIAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:18.343387 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:57770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzIqTCbgAP5jq5TehIQwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:25.380157 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:57784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzKLysWC90G-1nBrBhbAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:27.763407 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:57788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzK_9ocpUE4ed4uDwQhAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:29.034233 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:45342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzLaQpVkWug9HeOt9QcwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:30.251835 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:45350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzLrysWC90G-1nBrBhbgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:31.581696 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:45362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzL8_BxrYCr4hPDw8HJQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:33.831758 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:45378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzMdSswJuvopo3lOh9pAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:35.137685 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:45382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzM9SswJuvopo3lOh9pQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:36.354558 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzNNSswJuvopo3lOh9pgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:37.823936 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:45408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzNf9ocpUE4ed4uDwQiAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:46.809837 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:54038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzPv9ocpUE4ed4uDwQkwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:17:27.211116 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:34906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzZ6TCbgAP5jq5TehIdAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:28.554866 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:36016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzaKQpVkWug9HeOt9QfwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:29.735246 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:36030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzaf9ocpUE4ed4uDwQmAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:30.939682 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzalajLEzk2WiQ-10vZQAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:32.258758 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:36050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbM_BxrYCr4hPDw8HNAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:33.464720 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:36062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbdSswJuvopo3lOh9uQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:34.769700 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:36078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbrABkC4fWIHEf8EU2wAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:38.087179 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:36090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzcv9ocpUE4ed4uDwQnAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:39.419531 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:49906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzc0r9dMAiw-8KANNl3wAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:40.588505 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:49920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzdLABkC4fWIHEf8EU3QAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:41.883053 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:49922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzdaTCbgAP5jq5TehIdgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:43.028120 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:49930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzd9SswJuvopo3lOh9wAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:44.428473 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:49946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzeM_BxrYCr4hPDw8HNwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:45.567486 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:49962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzef9ocpUE4ed4uDwQnQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:46.903194 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:49966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzetSswJuvopo3lOh9wQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:48.124132 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:49492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfKQpVkWug9HeOt9QgQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:49.353926 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:49494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfY6lpbStxTqkSkuGDQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:50.685814 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:49496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfv9ocpUE4ed4uDwQnwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:52.007791 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:49508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzgI6lpbStxTqkSkuGDgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:53.901660 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:49524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzgaQpVkWug9HeOt9QhAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:55.063469 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:58418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzg8_BxrYCr4hPDw8HOwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:55.272520 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:49538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzg9SswJuvopo3lOh9wgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:56.431275 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:49540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhLABkC4fWIHEf8EU4gAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:57.748842 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:49552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhaQpVkWug9HeOt9QhQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:58.938371 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:53934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhrysWC90G-1nBrBhiAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:00.300385 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:53940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhziKQpVkWug9HeOt9QhgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:01.520403 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:53944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhziVajLEzk2WiQ-10vfwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:02.906029 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:53954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzirysWC90G-1nBrBhiQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:04.111284 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:53970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjNSswJuvopo3lOh9yAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:05.489153 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:53986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjY6lpbStxTqkSkuGFQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:06.723273 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:54000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjqQpVkWug9HeOt9QiQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:08.087497 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:54012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkLysWC90G-1nBrBhjQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:09.303638 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:50156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkVajLEzk2WiQ-10vhQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:10.628360 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:50162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkv9ocpUE4ed4uDwQpgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:11.783621 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:50178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzk_9ocpUE4ed4uDwQqAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:13.145641 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzlbysWC90G-1nBrBhjgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:14.313903 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:50186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzlkr9dMAiw-8KANNl9wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:15.709429 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:50190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzl0r9dMAiw-8KANNl-gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:17.463321 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzmaQpVkWug9HeOt9QjwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:20.011675 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:52270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzmlajLEzk2WiQ-10vjQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:22.431253 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:52282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhznqQpVkWug9HeOt9QlAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:23.782399 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:52298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzn46lpbStxTqkSkuGGAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:27.088757 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:52314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzo1ajLEzk2WiQ-10vlwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:28.403197 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:36440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpI6lpbStxTqkSkuGGQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:29.589074 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:36452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpc_BxrYCr4hPDw8HWgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:30.901118 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:36462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpqTCbgAP5jq5TehIgwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:30.947808 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:58434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzps_BxrYCr4hPDw8HXQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:18:32.127036 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:36476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqLysWC90G-1nBrBhkwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:32.331415 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqLysWC90G-1nBrBhlAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:33.452900 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:36478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqaTCbgAP5jq5TehIiQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:36.749696 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:36486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzrNSswJuvopo3lOh90AAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:37.954150 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:36488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzrdSswJuvopo3lOh90QAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:39.132808 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:49170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzr7ysWC90G-1nBrBhlQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:47.091269 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:34056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzt6TCbgAP5jq5TehIlgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:47.402222 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:49176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzt9SswJuvopo3lOh92QAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:39.580156 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:60858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz66TCbgAP5jq5TehI0AAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:54.858195 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:60908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz-qQpVkWug9HeOt9Q2wAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:56.200175 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:50022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz_NSswJuvopo3lOh97wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:00.888860 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.244.31:45432] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh0ALysWC90G-1nBrBhrgAAAY8"]
[Mon Mar 16 18:20:07.223382 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:50036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0B_9ocpUE4ed4uDwQ6gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:28.136007 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:43564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0HI6lpbStxTqkSkuGRgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:30.589142 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:55872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0Ho6lpbStxTqkSkuGSgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:36.075006 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:43574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0JM_BxrYCr4hPDw8HfQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:51.395752 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:57060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0M_9ocpUE4ed4uDwRGQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:52.764629 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0NP9ocpUE4ed4uDwRGgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:21:46.267384 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:43580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0arABkC4fWIHEf8EVhgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:21:46.987478 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:36030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0aqTCbgAP5jq5TehJTAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:48.431108 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:50514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0bM_BxrYCr4hPDw8HjQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:21:49.603490 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:50524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0bdSswJuvopo3lOh-GwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:51.914925 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:50534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0b6TCbgAP5jq5TehJUQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:21:53.475315 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:57238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0cVajLEzk2WiQ-10wHAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:56.823130 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:50538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0dLysWC90G-1nBrBhzgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:22:01.600891 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:48428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0eaTCbgAP5jq5TehJZgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:22:07.060131 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:56748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0f6TCbgAP5jq5TehJcAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:13.258997 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:35640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0hbABkC4fWIHEf8EVnwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:22:39.111245 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:48224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0n7ysWC90G-1nBrBiDQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:40.527477 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:33480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0oNSswJuvopo3lOh-NgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:41.803522 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:33496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0of9ocpUE4ed4uDwRPQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:49.631643 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:33512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0qdSswJuvopo3lOh-PQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:58.394262 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0srABkC4fWIHEf8EVuAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:59.735854 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:32976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0s6TCbgAP5jq5TehJoAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:23:47.746417 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:32990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh049SswJuvopo3lOh-dQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:49.151287 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:45912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh05aQpVkWug9HeOt9RKQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:51.638994 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:45924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh058_BxrYCr4hPDw8H0AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:54.115621 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:45930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh06qQpVkWug9HeOt9RKwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:10.691983 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:45936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0-qQpVkWug9HeOt9RRgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:22.896062 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:52612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1BqTCbgAP5jq5TehJ0AAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:24:25.283517 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:57040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1CVajLEzk2WiQ-10wWQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:27.831486 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:57042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1C46lpbStxTqkSkuGqgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:41.754326 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:55496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1GbABkC4fWIHEf8EV7AAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:43.053542 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:51378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1G0r9dMAiw-8KANNmZAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:47.859066 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:58282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1H7ysWC90G-1nBrBipgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:24:59.669251 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1K_9ocpUE4ed4uDwR1QAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:25:57.102520 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:35858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1ZY6lpbStxTqkSkuG-gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:25:58.487817 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:49860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1ZlajLEzk2WiQ-10wgAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:26:07.711471 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:49868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1b6TCbgAP5jq5TehKDAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:27.559647 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:60640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1g0r9dMAiw-8KANNmpAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:26:39.723218 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:40800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1j7ysWC90G-1nBrBjIAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:52.879437 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.228.16:36220] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh1nEr9dMAiw-8KANNmsgAAAQ8"]
[Mon Mar 16 18:26:53.642471 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:53730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1nVajLEzk2WiQ-10wswAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:56.391071 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:52910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1oP9ocpUE4ed4uDwSLQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:57.738903 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:52916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1obysWC90G-1nBrBjJwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:27:37.603408 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:43056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1yf9ocpUE4ed4uDwSVAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:27:57.942925 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:41344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh13Ur9dMAiw-8KANNm_AAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:27:58.469622 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh13rysWC90G-1nBrBjUgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:29:40.259776 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:51510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2RKQpVkWug9HeOt9SsAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:29:41.647473 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:37920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2RbysWC90G-1nBrBjgQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:29:45.995354 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:37930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2Sc_BxrYCr4hPDw8IqwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:29:52.419510 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:52062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2UKQpVkWug9HeOt9SvgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:29:55.600668 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:37946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2U9SswJuvopo3lOh_DwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:30:02.837205 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.244.31:33616] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh2WlajLEzk2WiQ-10w9wAAAo4"]
[Mon Mar 16 18:30:03.648365 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:52974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2W_9ocpUE4ed4uDwSmAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:30:06.273067 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:52464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2XtSswJuvopo3lOh_FwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:30:12.899162 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:52470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2ZLABkC4fWIHEf8EWewAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:30:15.351316 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:38870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2Z6QpVkWug9HeOt9SwQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:30:45.347174 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:46514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2hf9ocpUE4ed4uDwSxAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:00.721077 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:38884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2lLysWC90G-1nBrBjuwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:10.302997 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:43594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2nqTCbgAP5jq5TehKggAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:11.584834 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:40806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2n8_BxrYCr4hPDw8I0gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:14.903879 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2oqQpVkWug9HeOt9S8AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:15.325417 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:37752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2o6QpVkWug9HeOt9S8QAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:20.834889 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:48806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2qNSswJuvopo3lOh_cwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:38.296130 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2utSswJuvopo3lOh_kAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:39.652192 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2u7ysWC90G-1nBrBjywAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:41.042485 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:53302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2vY6lpbStxTqkSkuHhQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:49.119581 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:50446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2xY6lpbStxTqkSkuHjgAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:51.353071 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:49086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2xv9ocpUE4ed4uDwS5QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:52.769756 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:49100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2yP9ocpUE4ed4uDwS6QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:58.724368 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.228.16:48414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh2zkr9dMAiw-8KANNnQwAAARQ"]
[Mon Mar 16 18:32:07.359610 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:46208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh217ABkC4fWIHEf8EW7AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:32:09.875448 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:50918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh22Y6lpbStxTqkSkuHlAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:32:10.535017 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:49110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh22rABkC4fWIHEf8EW9AAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:32:21.753164 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:44840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh25VajLEzk2WiQ-10xKwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:33:07.151036 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:37620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3E6TCbgAP5jq5TehKzwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:13.809988 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:43528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3Gc_BxrYCr4hPDw8JNQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:31.168158 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:49600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3K6QpVkWug9HeOt9TmAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:33.011171 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:38538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3LLABkC4fWIHEf8EXLAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:33:36.659723 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:37996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3L8_BxrYCr4hPDw8JXwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:37.998970 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:51850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3MUr9dMAiw-8KANNnbAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:34:37.743365 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:38552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3bc_BxrYCr4hPDw8JoAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:34:43.657087 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:46490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3c9SswJuvopo3lOiABQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:02.527222 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:37156] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh3ho6lpbStxTqkSkuH3AAAAlI"]
[Mon Mar 16 18:35:10.388862 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:46498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3jrysWC90G-1nBrBkQQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:35:17.050932 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:51854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3lbABkC4fWIHEf8EXpQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:31.916825 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:41548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3o7ysWC90G-1nBrBkVAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:35:41.960154 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:38750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3rc_BxrYCr4hPDw8JxAAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:46.573167 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:47450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3skr9dMAiw-8KANNnxQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:36:30.549933 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:50564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh33kr9dMAiw-8KANNoIQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:36:37.510791 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:45636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh35bABkC4fWIHEf8EXygAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:36:38.754941 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:42876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh35rABkC4fWIHEf8EXzAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:37:01.531218 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:42878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3_bABkC4fWIHEf8EX7AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:37:02.010835 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.228.16:41356] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh3_qTCbgAP5jq5TehLJgAAAs4"]
[Mon Mar 16 18:37:28.470342 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:42798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4GM_BxrYCr4hPDw8KCwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:37:58.024395 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:37142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4NrysWC90G-1nBrBkmwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:38:03.903152 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:47364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4O6QpVkWug9HeOt9UUAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:08.959425 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:47378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4QKQpVkWug9HeOt9UUwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:26.991173 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:35624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4UrABkC4fWIHEf8EYLgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:34.913546 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:57970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4WtSswJuvopo3lOiA3gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:38:36.114296 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:58538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4XI6lpbStxTqkSkuIOwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:16.051617 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:58542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4hLysWC90G-1nBrBkxgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:19.367717 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:42244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4h1ajLEzk2WiQ-10yMAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:20.621613 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:41198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4iKQpVkWug9HeOt9UigAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:21.692724 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:45472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4ibysWC90G-1nBrBkywAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:24.344686 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:45476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4jEr9dMAiw-8KANNomwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:31.151301 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:45482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4k46lpbStxTqkSkuIRwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:33.137262 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:46600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4laQpVkWug9HeOt9UlQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:33.544157 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4ldSswJuvopo3lOiA5wAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:41.722602 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4nf9ocpUE4ed4uDwTsQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:43.224258 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:34072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4n1ajLEzk2WiQ-10yMQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:48.071724 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4pFajLEzk2WiQ-10yNwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:54.199715 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:46100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4qo6lpbStxTqkSkuIXAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:40:03.121702 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.244.31:55666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh4s_9ocpUE4ed4uDwTxwAAAg8"]
[Mon Mar 16 18:40:06.812485 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:45558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4taTCbgAP5jq5TehLYgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:40:08.173210 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4uP9ocpUE4ed4uDwTzAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:40:41.971097 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:54610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh42f9ocpUE4ed4uDwUDAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:41:01.402891 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:45404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh47Ur9dMAiw-8KANNo2QAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:06.318533 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:42058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48v9ocpUE4ed4uDwUIgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:06.418242 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:50878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48v9ocpUE4ed4uDwUIwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:41:07.602208 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:42060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48_9ocpUE4ed4uDwUJAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:41:22.363625 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:42934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5ArysWC90G-1nBrBlOgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:41.807771 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:39842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5Ff9ocpUE4ed4uDwURAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:49.851864 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:40290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5HbysWC90G-1nBrBlYAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:42:02.422418 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.228.16:50236] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh5KtSswJuvopo3lOiBFwAAAJg"]
[Mon Mar 16 18:42:26.443264 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:40714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5QlajLEzk2WiQ-10yngAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:42:44.114393 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:51044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5VNSswJuvopo3lOiBOQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:43:07.550976 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:33208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5a0r9dMAiw-8KANNpOwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:43:58.828343 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:46844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5nrysWC90G-1nBrBltQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:44:07.491500 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:51082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5p6QpVkWug9HeOt9UvQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:44:08.926566 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:40508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5qEr9dMAiw-8KANNpQAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:36.219310 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:40516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5xKTCbgAP5jq5TehLnwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:38.562240 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:38320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5xqTCbgAP5jq5TehLoQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:44:39.830216 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:33498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5x7ABkC4fWIHEf8EYvAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:43.177801 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:50408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5y46lpbStxTqkSkuI7gAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:44:56.739684 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:33512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh52KQpVkWug9HeOt9U0AAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:45:01.453861 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:52056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh53bABkC4fWIHEf8EY3AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:03.569339 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.244.31:58084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh5346lpbStxTqkSkuI8AAAAk4"]
[Mon Mar 16 18:45:14.017601 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:48572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh56v9ocpUE4ed4uDwUsQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:19.079196 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:38330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh570r9dMAiw-8KANNpUgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:45:27.792852 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:56088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh59v9ocpUE4ed4uDwUvgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:30.292648 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:35888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5-qTCbgAP5jq5TehLpwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:46:07.965022 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:35904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6H0r9dMAiw-8KANNpfgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:09.217965 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:54280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6IaQpVkWug9HeOt9U3gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:10.541364 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:54288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6IqQpVkWug9HeOt9U3wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:12.716265 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:54304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6JKQpVkWug9HeOt9U4QAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:14.004455 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6JqTCbgAP5jq5TehLrwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:15.307362 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:54324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6J7ysWC90G-1nBrBl1wAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:16.608984 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:54328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6KI6lpbStxTqkSkuI9QAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:18.993554 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:54336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6KlajLEzk2WiQ-10zcAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:20.332873 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:39844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6LLABkC4fWIHEf8EZIgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:21.647135 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:39856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6LaQpVkWug9HeOt9U4wAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:22.833099 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:39858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6Lo6lpbStxTqkSkuI9wAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:24.162506 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:39874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6MFajLEzk2WiQ-10zdgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:25.431575 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:39880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6MaTCbgAP5jq5TehLugAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:28.464916 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:39882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6NKTCbgAP5jq5TehLwAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:37.919228 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:33556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6PaTCbgAP5jq5TehLzQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:44.079142 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:41232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6RLysWC90G-1nBrBl3QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:46.879582 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:41240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6RqTCbgAP5jq5TehL2QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:48.215704 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:52960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6SM_BxrYCr4hPDw8KswAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:49.527776 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:52972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6SbABkC4fWIHEf8EZJwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:54.162159 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:52976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6Ts_BxrYCr4hPDw8KvAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:04.147750 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.228.16:33146] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh6V1ajLEzk2WiQ-10ziwAAAoQ"]
[Mon Mar 16 18:47:07.055277 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:52986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6W8_BxrYCr4hPDw8K0AAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:23.531287 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:49446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6a1ajLEzk2WiQ-10zoAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:25.931899 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:60436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6bbABkC4fWIHEf8EZLgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:28.323295 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:60450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cKTCbgAP5jq5TehMAAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:29.641460 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cUr9dMAiw-8KANNpkAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:31.453167 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:35744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cv9ocpUE4ed4uDwU1QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:39.028979 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:35748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6e7ysWC90G-1nBrBl7AAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:42.547280 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:35696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6fs_BxrYCr4hPDw8K8AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:47:47.886516 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6g7ysWC90G-1nBrBl8gAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:49.217531 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:33956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6hUr9dMAiw-8KANNpkgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:08.755715 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:33966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6mLABkC4fWIHEf8EZSgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:10.147617 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:57338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6mrABkC4fWIHEf8EZTQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:20.343785 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:57344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6pLABkC4fWIHEf8EZXAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:48:21.638031 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:51904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6paQpVkWug9HeOt9U7wAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:48:47.809269 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:51918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6vs_BxrYCr4hPDw8LEgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:49.152682 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:34330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6waQpVkWug9HeOt9U8wAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:50.457974 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:34338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6wlajLEzk2WiQ-10ztQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:51.852971 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:34346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6w6TCbgAP5jq5TehMLAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:53.189125 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:34348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6xf9ocpUE4ed4uDwU2gAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:02.395776 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:34362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6zs_BxrYCr4hPDw8LJwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:03.780048 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:53622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6z9SswJuvopo3lOiBdAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:05.611255 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:53638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh60bABkC4fWIHEf8EZYwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:06.990029 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:53650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh60lajLEzk2WiQ-10zuAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:11.056071 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:46068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh618_BxrYCr4hPDw8LNgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:14.699470 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:46074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh62rysWC90G-1nBrBl_QAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:16.058624 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:46076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63LABkC4fWIHEf8EZZQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:17.346695 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:46082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63Ur9dMAiw-8KANNpmgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:18.656189 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:41334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63kr9dMAiw-8KANNpnAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:19.064984 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6346lpbStxTqkSkuJVAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:19.963022 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:41346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh630r9dMAiw-8KANNpnwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:26.705224 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:41360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh65s_BxrYCr4hPDw8LTAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:29.223656 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:41366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh66aTCbgAP5jq5TehMMgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:30.552791 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:34002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh66rABkC4fWIHEf8EZawAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:32.979795 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:34018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67Er9dMAiw-8KANNppAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:33.133325 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67Y6lpbStxTqkSkuJYQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:49:34.341634 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:34020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67rABkC4fWIHEf8EZbgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:37.772777 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh68bABkC4fWIHEf8EZdQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:40.247358 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:36988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69M_BxrYCr4hPDw8LWAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:41.582249 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:36996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69bysWC90G-1nBrBmAgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:42.937373 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:37000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69kr9dMAiw-8KANNppgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:45.398556 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:37010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6-Ur9dMAiw-8KANNpqAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:47.160276 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:37704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6-7ABkC4fWIHEf8EZfwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:48.931250 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:37018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6_P9ocpUE4ed4uDwU4wAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:51.316258 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:50144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6_6QpVkWug9HeOt9U-gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:52.848150 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:40108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7AI6lpbStxTqkSkuJZwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:49:53.738977 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:50160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7AdSswJuvopo3lOiBewAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:56.399604 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:50168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7A46lpbStxTqkSkuJawAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:57.709564 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:50176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7BbABkC4fWIHEf8EZggAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:03.358915 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:44320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7C1ajLEzk2WiQ-10zwwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:09.194888 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:44322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7Ef9ocpUE4ed4uDwU7QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:15.732926 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:53114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7F9SswJuvopo3lOiBhgAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:23.603163 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:53124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7H46lpbStxTqkSkuJkQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:26.225400 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:38414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7IqTCbgAP5jq5TehMOQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:28.617120 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:38416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7JNSswJuvopo3lOiBiAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:45.002893 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:57820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7NdSswJuvopo3lOiBoAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:47.495077 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:43380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7N46lpbStxTqkSkuJrAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:48.743653 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:60888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7OP9ocpUE4ed4uDwU9AAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:51:01.601088 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:60898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7RaQpVkWug9HeOt9VCgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:51:17.721990 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:53312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7VY6lpbStxTqkSkuJywAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:04.015190 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.228.16:47382] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh7hFajLEzk2WiQ-100BAAAApI"]
[Mon Mar 16 18:52:04.764059 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7hM_BxrYCr4hPDw8L0AAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:06.086621 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:47306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7hlajLEzk2WiQ-100CgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:07.269570 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:47314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7h1ajLEzk2WiQ-100DQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:12.177591 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:40980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jI6lpbStxTqkSkuJ3AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:13.500607 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:40986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jUr9dMAiw-8KANNqNAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:14.884222 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:40998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jrysWC90G-1nBrBmWQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:16.207317 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:41014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7kNSswJuvopo3lOiBtQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:17.538929 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:41020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7kUr9dMAiw-8KANNqOQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:18.927752 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:56654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ktSswJuvopo3lOiBtgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:20.249258 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:56660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7lP9ocpUE4ed4uDwVFAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:22.733979 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ltSswJuvopo3lOiBuAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:25.654076 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:56680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7mbABkC4fWIHEf8EZrAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:27.115888 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:56692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7m_9ocpUE4ed4uDwVFwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:29.931047 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:34134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7naQpVkWug9HeOt9VGAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:31.231067 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:34144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7n_9ocpUE4ed4uDwVGQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:32.613810 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:34152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7oKQpVkWug9HeOt9VGQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:33.950241 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7obABkC4fWIHEf8EZrQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:36.558492 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:34180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7pKTCbgAP5jq5TehMkgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:37.888847 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:34182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7pf9ocpUE4ed4uDwVHQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:39.200596 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:41544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7p46lpbStxTqkSkuJ4AAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:40.583681 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:41550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7qNSswJuvopo3lOiBuwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:41.923075 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:41562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7qaQpVkWug9HeOt9VGgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:43.241802 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:41578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7q6QpVkWug9HeOt9VHAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:44.516859 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:41588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7rI6lpbStxTqkSkuJ5AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:45.167830 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:51744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7raTCbgAP5jq5TehMmgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:45.861306 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:41604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7rc_BxrYCr4hPDw8L1gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:47.239274 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:41608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7r_9ocpUE4ed4uDwVHwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:48.577564 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:53102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7sFajLEzk2WiQ-100GAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:50.023555 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:53114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7sv9ocpUE4ed4uDwVIAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:52.421526 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:53118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7tI6lpbStxTqkSkuJ6QAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:53.790776 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:53128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7tf9ocpUE4ed4uDwVIQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:55.175340 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:53138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7t6QpVkWug9HeOt9VIAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:56.479289 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:53144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7uKQpVkWug9HeOt9VIQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:57.782823 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:53154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7uaTCbgAP5jq5TehMnAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:58.888803 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:45768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ukr9dMAiw-8KANNqWgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:01.750956 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7vbABkC4fWIHEf8EZswAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:03.047272 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:45792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7v6TCbgAP5jq5TehMnQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:04.203698 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:45802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7wFajLEzk2WiQ-100HAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:06.606619 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:45814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7wlajLEzk2WiQ-100HgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:07.917497 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:45830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7w6TCbgAP5jq5TehMngAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:09.086400 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7xaTCbgAP5jq5TehMoAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:10.447266 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:55890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7xqQpVkWug9HeOt9VIwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:11.788885 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:55900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7x8_BxrYCr4hPDw8L3gAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:13.093887 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:55906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7yc_BxrYCr4hPDw8L4QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:15.595663 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:55914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ys_BxrYCr4hPDw8L5AAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:16.879305 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:55930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7zFajLEzk2WiQ-100IAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:18.046600 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:54004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7zv9ocpUE4ed4uDwVJgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:19.383853 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7z6TCbgAP5jq5TehMpAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:20.245603 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:55964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh70NSswJuvopo3lOiB3gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:53:20.679025 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:54024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh70LABkC4fWIHEf8EZvQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:39.689744 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:54014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh740r9dMAiw-8KANNqegAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:54:02.436676 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:49118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7-VajLEzk2WiQ-100PwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:54:09.664325 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:59442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8AVajLEzk2WiQ-100RQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:54:49.863691 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:54034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8KY6lpbStxTqkSkuKQwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:04.023617 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.244.31:58118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh8ONSswJuvopo3lOiB9wAAAIg"]
[Mon Mar 16 18:55:04.949251 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:56564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8OLysWC90G-1nBrBmrAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:15.033424 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:56578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Q1ajLEzk2WiQ-100WAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:18.630390 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:37278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Rkr9dMAiw-8KANNqtQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:55:32.365482 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:36676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8VI6lpbStxTqkSkuKVQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:38.645106 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:60410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8WrysWC90G-1nBrBmyQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:55:43.262116 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:33614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8X7ysWC90G-1nBrBm0gAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:47.298976 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:43118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Y6QpVkWug9HeOt9VpQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:49.963900 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:40822] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ZI6lpbStxTqkSkuKWQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:55:49.998707 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:39260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ZbABkC4fWIHEf8EaDgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:14.603849 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:40828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8frABkC4fWIHEf8EaLAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:15.858640 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:42550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8f7ABkC4fWIHEf8EaLgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:22.459231 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:42554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ho6lpbStxTqkSkuKYQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:40.479438 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:49506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8mEr9dMAiw-8KANNq3QAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:51.706937 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:33208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8oo6lpbStxTqkSkuKaAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:53.042963 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:44734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8paTCbgAP5jq5TehMzgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:54.262220 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:44736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8prysWC90G-1nBrBnPQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:55.539807 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:44744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8p7ABkC4fWIHEf8EaOgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:56.826763 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:44760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8qLysWC90G-1nBrBnQwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:58.013971 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:50500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8qkr9dMAiw-8KANNq7QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:59.148155 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:50514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8q0r9dMAiw-8KANNq7wAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:00.442083 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:50518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8rNSswJuvopo3lOiCAAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:02.694558 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:50524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8raQpVkWug9HeOt9VrwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:04.034613 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:50530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8sFajLEzk2WiQ-100YgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:05.306935 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:50532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8saQpVkWug9HeOt9VsAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:06.647002 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:52608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh8stSswJuvopo3lOiCAgAAAIQ"]
[Mon Mar 16 18:57:06.674452 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:50548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8sqQpVkWug9HeOt9VsQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:07.819010 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:50552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8s9SswJuvopo3lOiCBAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:09.122166 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:57592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8tf9ocpUE4ed4uDwVtgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:10.300037 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:57600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8to6lpbStxTqkSkuKagAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:12.999727 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:57606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8uP9ocpUE4ed4uDwVuwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:15.642863 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:57612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8us_BxrYCr4hPDw8MXgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:18.011054 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:57620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8vqTCbgAP5jq5TehM2AAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:19.332932 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:59204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8v1ajLEzk2WiQ-100ZgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:20.547790 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:59210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8wFajLEzk2WiQ-100ZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:21.870986 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8wVajLEzk2WiQ-100agAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:23.030253 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:40164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8w7ysWC90G-1nBrBnbQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:24.278100 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:59228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xM_BxrYCr4hPDw8MYQAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:25.591152 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:59244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xdSswJuvopo3lOiCBwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:26.807035 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:59252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xrABkC4fWIHEf8EaQgAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:29.922413 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:59760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8yaQpVkWug9HeOt9VugAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:32.202455 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:59766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8y9SswJuvopo3lOiCCAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:33.529340 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:59782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8zY6lpbStxTqkSkuKbgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:34.722333 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:59792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8zrysWC90G-1nBrBndgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:36.030156 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:59798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80LysWC90G-1nBrBneQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:37.289184 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:59810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80Ur9dMAiw-8KANNrHAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:38.511462 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:43138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80lajLEzk2WiQ-100bwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:38.560241 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:35436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80qTCbgAP5jq5TehM5wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:40.982966 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:43146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh81FajLEzk2WiQ-100dgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:42.313112 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:43160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh81o6lpbStxTqkSkuKbwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:43.209449 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:50492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh811ajLEzk2WiQ-100eAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:43.507536 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:43166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh817ABkC4fWIHEf8EaRwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:44.791448 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:43168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh82M_BxrYCr4hPDw8MYwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:45.935597 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:43170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh82f9ocpUE4ed4uDwVwgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:48.345808 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:43182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83P9ocpUE4ed4uDwVxAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:48.790175 2026] [mime_magic:error] [pid 14895:tid 140411540502272] (70014)End of file found: [client 74.7.243.203:56192] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/kbd
[Mon Mar 16 18:57:49.680314 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:40824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83Y6lpbStxTqkSkuKcAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:50.847053 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83o6lpbStxTqkSkuKcwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:52.115329 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:40846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh84KTCbgAP5jq5TehM6AAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:54.367484 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:40848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh84bysWC90G-1nBrBnggAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:55.674995 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:40862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh847ABkC4fWIHEf8EaSwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:56.843392 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:40876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh85KTCbgAP5jq5TehM6QAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:58.184181 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:59968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh85s_BxrYCr4hPDw8MbgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:59.377108 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:59972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8546lpbStxTqkSkuKdAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:00.651741 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:59980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh86P9ocpUE4ed4uDwVxgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:03.923397 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:60004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh866TCbgAP5jq5TehM6wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:05.619525 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:60008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh87aTCbgAP5jq5TehM7gAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:08.182992 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:60024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh88KTCbgAP5jq5TehM8gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:09.907581 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:46456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh88c_BxrYCr4hPDw8MfAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:19.885059 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:46462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8-8_BxrYCr4hPDw8MhwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:58:22.211764 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:44928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8_o6lpbStxTqkSkuKhQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:58:50.390850 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:44934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9GlajLEzk2WiQ-100oQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:55.108603 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:44318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9H0r9dMAiw-8KANNrTQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:59:28.657670 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9QNSswJuvopo3lOiChQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:59:36.183605 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:59782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9SNSswJuvopo3lOiClAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:59:48.446326 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:37782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9VM_BxrYCr4hPDw8MygAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:59:49.436772 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:59796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9VY6lpbStxTqkSkuK-QAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:00:04.987008 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:58020] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh9ZLABkC4fWIHEf8EahwAAAFc"]
[Mon Mar 16 19:00:37.151238 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9g7ysWC90G-1nBrBnxQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 19:01:13.309254 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:34998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9qf9ocpUE4ed4uDwWAwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:16.825350 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:45918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9rLABkC4fWIHEf8EbGwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:18.109837 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:58576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9rkr9dMAiw-8KANNrZwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:24.079577 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:58590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9tLysWC90G-1nBrBn3AAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:35.394572 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:58598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9v0r9dMAiw-8KANNrdAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:37.962557 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:34642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9wUr9dMAiw-8KANNrdgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:40.550981 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:36088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9xLysWC90G-1nBrBn7QAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:41.326766 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:38230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9xUr9dMAiw-8KANNregAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:44.735579 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:38242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9yKQpVkWug9HeOt9V6AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:47.035480 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:38246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9y8_BxrYCr4hPDw8M6gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:01.615291 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:36220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh92aQpVkWug9HeOt9V-QAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:08.060049 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:58456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh94LABkC4fWIHEf8EbJgAAAEg"]
[Mon Mar 16 19:02:15.449324 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:43310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh956QpVkWug9HeOt9WBgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:20.483023 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:56978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh97LABkC4fWIHEf8EbKwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:02:45.104726 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:55264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-Bf9ocpUE4ed4uDwWKAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:51.548224 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:35096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-C7ABkC4fWIHEf8EbQgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:55.795896 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:40722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-D7ysWC90G-1nBrBoKgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:03:41.635580 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:40726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-PVajLEzk2WiQ-101PQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:03:46.440646 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:34326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-Qs_BxrYCr4hPDw8NBgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:03:54.118261 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:59488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-StSswJuvopo3lOiDVAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 19:05:03.558216 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:34336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-j6QpVkWug9HeOt9WaAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:04.910421 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-kKTCbgAP5jq5TehNsgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:05.319284 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.244.31:53678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh-kbysWC90G-1nBrBohQAAAYo"]
[Mon Mar 16 19:05:19.801592 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:33716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-n6QpVkWug9HeOt9WdgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:42.794143 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:36486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-tv9ocpUE4ed4uDwWqgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:05:50.836130 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:56354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-vo6lpbStxTqkSkuLpQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:06:04.454942 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:60398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-zNSswJuvopo3lOiDmwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:41.528005 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:52914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-8bysWC90G-1nBrBoswAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:42.817522 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:41780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-8v9ocpUE4ed4uDwWtgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:50.522918 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:41794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh--lajLEzk2WiQ-101iwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:06:55.000194 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:49756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-_o6lpbStxTqkSkuLxAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:06:56.299091 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:49764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_AKTCbgAP5jq5TehNxgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:07:06.184770 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:49772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Ckr9dMAiw-8KANNr6wAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:07:08.819191 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.228.16:48002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh_DLysWC90G-1nBrBotgAAAZc"]
[Mon Mar 16 19:07:37.513809 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:56214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Kc_BxrYCr4hPDw8NrAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:02.948468 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:42158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Qkr9dMAiw-8KANNsCwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:05.227436 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:35226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Rc_BxrYCr4hPDw8NuAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:06.602293 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:35238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_RqTCbgAP5jq5TehN2gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:08.830589 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:35254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_SLysWC90G-1nBrBowgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:10.109605 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:49050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_SlajLEzk2WiQ-101nAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:13.371166 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:49052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_TbysWC90G-1nBrBoyQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:14.855241 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_TrABkC4fWIHEf8EcUAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:16.053992 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:49078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ULABkC4fWIHEf8EcUgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:18.367917 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:49090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_UtSswJuvopo3lOiDxwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:19.717328 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_U1ajLEzk2WiQ-101ngAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:21.915460 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:39086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_VY6lpbStxTqkSkuMGQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:23.244152 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:39098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_V_9ocpUE4ed4uDwW0gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:26.222890 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_WaQpVkWug9HeOt9WuQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:27.678979 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:39126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_W_9ocpUE4ed4uDwW1QAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:28.904311 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:55120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_XLABkC4fWIHEf8EcVgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:30.258955 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:55134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_XrysWC90G-1nBrBo1wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:35.655347 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:57534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Y6QpVkWug9HeOt9WxAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:40.350986 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.243.203:36636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Z0r9dMAiw-8KANNsGAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:49.518466 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:40672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_cVajLEzk2WiQ-101sAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:51.272335 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_c_9ocpUE4ed4uDwW6wAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:54.780568 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:51470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_dtSswJuvopo3lOiD3QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:59.336409 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:51478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_e46lpbStxTqkSkuMOgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:00.622293 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:49954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_fFajLEzk2WiQ-101swAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:01.783800 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:49970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_fbysWC90G-1nBrBo7QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:03.121924 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:49972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_f7ysWC90G-1nBrBo7gAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:05.384518 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:49982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_gbysWC90G-1nBrBo9QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:06.673085 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:49996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_glajLEzk2WiQ-101tAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:14.942250 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:50010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_iqTCbgAP5jq5TehN-gAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:16.246958 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:49996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_jM_BxrYCr4hPDw8N0AAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:18.526987 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:50010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_jrABkC4fWIHEf8EcagAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:24.419024 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:42250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_lKQpVkWug9HeOt9W7QAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:27.124596 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:42258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_lY6lpbStxTqkSkuMPwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:30.556443 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:44556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_mkr9dMAiw-8KANNsKgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:38.665082 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:44568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_oqQpVkWug9HeOt9W_wAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:02.607918 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:41806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ukr9dMAiw-8KANNsRQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:05.039960 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:41876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_vVajLEzk2WiQ-101zgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:10:06.938041 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.244.31:46272] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh_vqTCbgAP5jq5TehOCAAAAtg"]
[Mon Mar 16 19:10:22.021215 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:48862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ztSswJuvopo3lOiENwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:37.931997 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_3bysWC90G-1nBrBpKwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:44.643320 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:55490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_5LABkC4fWIHEf8EclQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:47.053979 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:55506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_546lpbStxTqkSkuMYQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:57.057627 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:36636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_8Y6lpbStxTqkSkuMbAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:11:10.286943 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:59214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh__tSswJuvopo3lOiEVAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:11:32.501352 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAFI6lpbStxTqkSkuMgwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:11:46.319514 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:40578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAIUr9dMAiw-8KANNscgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:11:47.668848 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:34830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAI6TCbgAP5jq5TehOcQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:09.667058 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.228.16:35244] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiAOVajLEzk2WiQ-101-AAAApE"]
[Mon Mar 16 19:12:15.558134 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:45598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAP7ysWC90G-1nBrBpgwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:16.902895 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:34968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAQLysWC90G-1nBrBphgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:20.211654 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:45362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiARLysWC90G-1nBrBpjAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:26.141565 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiASv9ocpUE4ed4uDwXPAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:34.465504 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:46400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAUqTCbgAP5jq5TehOsgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:36.707008 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:45382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVLABkC4fWIHEf8Ec4QAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:37.972287 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:57796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVUr9dMAiw-8KANNsgwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:12:37.982911 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:54306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVc_BxrYCr4hPDw8OEwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:39.165503 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:60078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAV7ABkC4fWIHEf8Ec4gAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:40.497399 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:60080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAWKQpVkWug9HeOt9XcgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:43.417173 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:57802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAW9SswJuvopo3lOiEfQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:12:43.827421 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:60082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAW7ABkC4fWIHEf8Ec6gAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:46.796884 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:60090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAXrysWC90G-1nBrBprwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:51.508130 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:60102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAY7ABkC4fWIHEf8Ec7gAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:52.811134 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:42680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAZEr9dMAiw-8KANNshgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:56.212959 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:42694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAaLysWC90G-1nBrBpvQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:01.838200 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:42698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAbUr9dMAiw-8KANNsjQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:05.262887 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:40108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAcUr9dMAiw-8KANNskAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:09.879248 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:40112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAdaTCbgAP5jq5TehO0AAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:12.472573 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:39734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAeKQpVkWug9HeOt9XewAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:13.781964 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:39744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAebABkC4fWIHEf8Ec8gAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:17.280011 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:39758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAfbysWC90G-1nBrBpzQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:19.732006 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:39778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAf_9ocpUE4ed4uDwXSwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:35.147723 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:39780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAj_9ocpUE4ed4uDwXWwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:39.467641 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:49398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAk8_BxrYCr4hPDw8OIQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:40.767485 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:52322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlLABkC4fWIHEf8Ec9gAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:41.508586 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlaTCbgAP5jq5TehO7wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:41.959602 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:52334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlbysWC90G-1nBrBp0gAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:44.315420 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:52346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAmM_BxrYCr4hPDw8OJwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:13:53.467835 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:60112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAobysWC90G-1nBrBp3AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:58.176218 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:38386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiApqTCbgAP5jq5TehO-wAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:58.371062 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiApqQpVkWug9HeOt9XigAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:59.715335 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:44340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAp8_BxrYCr4hPDw8OKwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:09.399567 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:38400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAsaTCbgAP5jq5TehPCAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 19:14:16.401877 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:44348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAuLysWC90G-1nBrBp7AAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:17.743326 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:48600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAudSswJuvopo3lOiE2AAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:19.017822 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:55154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAu7ABkC4fWIHEf8EdAQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:32.650635 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:55156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAx6TCbgAP5jq5TehPGAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:40.770854 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:43214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA0FajLEzk2WiQ-102IAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:42.172871 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:46042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA0rysWC90G-1nBrBp7gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:57.749182 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:41402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA4c_BxrYCr4hPDw8OYwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:15:07.867848 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.244.31:53548] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiA67ysWC90G-1nBrBp9gAAAY4"]
[Mon Mar 16 19:15:30.311287 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:41898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBAs_BxrYCr4hPDw8OoQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:44.120842 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:36492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEKQpVkWug9HeOt9XxAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:45.469514 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:38014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEVajLEzk2WiQ-102KgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:46.679180 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:38026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEtSswJuvopo3lOiFEwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:47.997678 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:38034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBE9SswJuvopo3lOiFFAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:48.893199 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:55932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBFLysWC90G-1nBrBqCAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 19:15:50.319425 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:43330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBFrABkC4fWIHEf8EdJAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:53.790784 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:43346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBGY6lpbStxTqkSkuMwgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:59.463452 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:43362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBH7ABkC4fWIHEf8EdKwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:00.753215 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:35172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBIM_BxrYCr4hPDw8O0wAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:03.992782 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:35184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBI9SswJuvopo3lOiFFwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:06.383201 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:35186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBJtSswJuvopo3lOiFGQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:13.263242 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:35192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBLc_BxrYCr4hPDw8O8QAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:16.526933 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:36446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBL1ajLEzk2WiQ-102OAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:17.842929 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:36450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBMbysWC90G-1nBrBqCQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:19.014007 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:37142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBM46lpbStxTqkSkuMxQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:20.342735 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:37150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNKQpVkWug9HeOt9XyAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:21.544343 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:37154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNaQpVkWug9HeOt9XyQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:22.672238 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:37156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNs_BxrYCr4hPDw8PAwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:30.291677 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:37164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBPqTCbgAP5jq5TehPNgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:31.555455 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBP9SswJuvopo3lOiFIAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:34.896637 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:36364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBQqTCbgAP5jq5TehPOgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:37.256363 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:36372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBRY6lpbStxTqkSkuMyAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:38.555761 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:54094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBRtSswJuvopo3lOiFIgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:40.692330 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:54102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBSFajLEzk2WiQ-102PwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:44.036719 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTLysWC90G-1nBrBqFQAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:45.347881 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:54112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTbysWC90G-1nBrBqGQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:46.494571 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:54126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTs_BxrYCr4hPDw8PKQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:48.806956 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:54142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBUM_BxrYCr4hPDw8PMAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:50.064876 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:39690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBUv9ocpUE4ed4uDwXiAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:53.556478 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:39694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBVf9ocpUE4ed4uDwXjgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:55.863199 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:39710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBV0r9dMAiw-8KANNtSQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:06.143820 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:39714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBYo6lpbStxTqkSkuM0wAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:07.466976 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:43724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBY_9ocpUE4ed4uDwXkAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:10.387517 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:55356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBZEr9dMAiw-8KANNtWQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:14.804289 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:55360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBaqTCbgAP5jq5TehPRAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:19.826646 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:55368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBb_9ocpUE4ed4uDwXlQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:21.131714 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:59830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBcc_BxrYCr4hPDw8PWQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:22.276484 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:59840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBclajLEzk2WiQ-102TAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:23.566993 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:59842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBc6QpVkWug9HeOt9XzwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:26.867838 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:59858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBdqQpVkWug9HeOt9X1gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:32.524757 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:55992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBfI6lpbStxTqkSkuM3AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:34.499410 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:56004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBfVajLEzk2WiQ-102UQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:35.822415 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:56016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBf1ajLEzk2WiQ-102UwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:36.634756 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:43398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBgEr9dMAiw-8KANNtcAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:02.055121 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:60436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBmrABkC4fWIHEf8EdXwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:05.215490 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:56026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBnVajLEzk2WiQ-102cQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:18:07.590101 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:54684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBn6QpVkWug9HeOt9X3AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:08.770199 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:41982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBoEr9dMAiw-8KANNtdwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:12.214977 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:38362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBpFajLEzk2WiQ-102dAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:28.827579 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:38374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBtEr9dMAiw-8KANNtjgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:32.203162 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:38810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBuM_BxrYCr4hPDw8PlgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:56.048056 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:38824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB0I6lpbStxTqkSkuM9wAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:57.385599 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:57476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB0aQpVkWug9HeOt9X6AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:00.860194 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:40918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB1KTCbgAP5jq5TehPVAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:04.581766 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:40928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB2FajLEzk2WiQ-102fwAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:40.394582 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB_LABkC4fWIHEf8EdxAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:41.813049 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:45658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB_c_BxrYCr4hPDw8P3gAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:19:45.069982 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:45674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCAf9ocpUE4ed4uDwXwwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:19:57.306618 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:40944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCDKQpVkWug9HeOt9YHAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:20:08.096785 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.244.31:58760] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiCGFajLEzk2WiQ-102mwAAAo8"]
[Mon Mar 16 19:20:30.999209 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:45676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCLqTCbgAP5jq5TehPiAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:20:37.359147 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:42024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCNbysWC90G-1nBrBqhQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:20:45.304254 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:60564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCPY6lpbStxTqkSkuNJgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:20:57.300364 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCSY6lpbStxTqkSkuNOAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:21:01.725801 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:45154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCTY6lpbStxTqkSkuNQQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:21:01.799215 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:60566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCTY6lpbStxTqkSkuNQgAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:21:27.782474 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:39458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCZ8_BxrYCr4hPDw8QVgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:06.552355 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:58992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCjv9ocpUE4ed4uDwYFgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:12.245865 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:37524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiClEr9dMAiw-8KANNtzgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:27.461070 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:52726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCo9SswJuvopo3lOiGGgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:43.762599 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:33886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCs8_BxrYCr4hPDw8QkQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:48.205884 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:56816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCuLABkC4fWIHEf8EeIAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:49.436453 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:58866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCuaQpVkWug9HeOt9YOQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:06.153104 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:52106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCyrABkC4fWIHEf8EeMwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:25.118837 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:58868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC3c_BxrYCr4hPDw8QtgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:26.472770 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:46088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC3s_BxrYCr4hPDw8QuAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:32.578298 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:46094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5KTCbgAP5jq5TehPmAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:33.882774 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:49582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5f9ocpUE4ed4uDwYKwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:34.548383 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:54984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5kr9dMAiw-8KANNt5wAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:37.291390 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:49584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC6aQpVkWug9HeOt9YQAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:46.131205 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:48312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC8tSswJuvopo3lOiGTQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:23:48.514867 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:48316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC9P9ocpUE4ed4uDwYOAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:50.927162 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:39908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC9o6lpbStxTqkSkuNXwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:24:18.867397 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:39916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDErysWC90G-1nBrBqwQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:24:29.623098 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:52066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDHdSswJuvopo3lOiGewAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:24:38.872966 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:53424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDJqTCbgAP5jq5TehPpQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:24:43.590853 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:41110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDK6TCbgAP5jq5TehPqQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:24:47.200110 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:41112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDL7ABkC4fWIHEf8EeUgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:25:31.719018 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.243.203:41124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDW8_BxrYCr4hPDw8RMAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:25:54.015055 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:50278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDcFajLEzk2WiQ-104OQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:25:58.367649 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:48312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDdv9ocpUE4ed4uDwYowAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:26:16.677939 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:57860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDiNSswJuvopo3lOiGpwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:26:22.619787 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:43852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDjrysWC90G-1nBrBq2wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:26:25.011803 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:53996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDkc_BxrYCr4hPDw8ROAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:26:58.812852 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDsv9ocpUE4ed4uDwY3gAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:08.143055 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:46092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDvLysWC90G-1nBrBq_AAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:14.080875 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:40870] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiDwtSswJuvopo3lOiGxQAAAI4"]
[Mon Mar 16 19:27:18.903829 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:40800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDxs_BxrYCr4hPDw8RVwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:20.189774 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:39182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDyM_BxrYCr4hPDw8RWAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:24.675607 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:39186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDzLABkC4fWIHEf8EerQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:32.759301 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:39202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD1Er9dMAiw-8KANNuMQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:35.413806 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:57324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD19SswJuvopo3lOiG1gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:28:02.165928 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:57326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD8s_BxrYCr4hPDw8RbQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:21.741223 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:57118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEBVajLEzk2WiQ-104dwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:28:24.081283 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:57618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiECFajLEzk2WiQ-104eQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:36.214616 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:57630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEFKQpVkWug9HeOt9ZAQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:38.710872 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:60140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEFrysWC90G-1nBrBrJQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:28:41.140153 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:54788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEGf9ocpUE4ed4uDwZBQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:28:51.126966 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:58972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEI6TCbgAP5jq5TehQdwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:52.320084 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:54794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEJEr9dMAiw-8KANNuZAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:29:13.917912 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:33098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEObysWC90G-1nBrBrPgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:29:31.428257 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:54034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiES46lpbStxTqkSkuOFAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:29:34.860346 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:38596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiETs_BxrYCr4hPDw8RgwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:29:44.956694 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:38608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEWM_BxrYCr4hPDw8RkgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:29:50.691561 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:38630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEXtSswJuvopo3lOiHGAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:09.688689 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:56578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEcbysWC90G-1nBrBrWgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:10.958944 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:40018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEclajLEzk2WiQ-104twAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:11.609054 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.244.31:40500] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiEc7ysWC90G-1nBrBrWwAAAZc"]
[Mon Mar 16 19:30:16.027067 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEeP9ocpUE4ed4uDwZTAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:18.152470 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:40026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEes_BxrYCr4hPDw8RnQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:40.270889 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:59576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEkFajLEzk2WiQ-1048QAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 19:30:45.501769 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:51214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiElEr9dMAiw-8KANNu2AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:46.752460 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:59246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiElqTCbgAP5jq5TehQjgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:51.623079 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:57372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEm8_BxrYCr4hPDw8RpQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:52.913606 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEnKQpVkWug9HeOt9ZHgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:54.212868 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:57378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEnrysWC90G-1nBrBrZgAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:56.146060 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:41956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEoLABkC4fWIHEf8EfLQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:31:52.235316 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:57394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiE2LysWC90G-1nBrBrmwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:31:54.684885 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:38912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiE2tSswJuvopo3lOiHbAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:32:15.353681 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.228.16:56236] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiE70r9dMAiw-8KANNu8wAAAQY"]
[Mon Mar 16 19:32:44.375064 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:42520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFDNSswJuvopo3lOiHqwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:25.998888 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:38926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFNaTCbgAP5jq5TehQ8gAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:29.436468 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:49858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFOc_BxrYCr4hPDw8R4AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:32.837677 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFPKQpVkWug9HeOt9ZOQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:34.095756 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:39350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFPqTCbgAP5jq5TehQ9gAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:35.307954 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:39362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFP46lpbStxTqkSkuOMgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:36.417335 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:39368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQI6lpbStxTqkSkuONAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:37.705922 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:39380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQY6lpbStxTqkSkuONQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:38.922587 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:41120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQo6lpbStxTqkSkuOOAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:40.225336 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:41126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRLABkC4fWIHEf8Ef9AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:41.527620 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:41140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRbysWC90G-1nBrBrsAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:42.728621 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:41150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRkr9dMAiw-8KANNvGQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:44.026970 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:41152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSKTCbgAP5jq5TehQ-wAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:45.214576 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:41156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSdSswJuvopo3lOiHtgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:46.552315 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:41162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSqTCbgAP5jq5TehQ_gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:47.744543 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:41176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFS9SswJuvopo3lOiHtwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:48.904693 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:46284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFTLysWC90G-1nBrBrswAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:50.228420 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:46288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFTo6lpbStxTqkSkuOOwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:51.368575 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:46298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFT7ABkC4fWIHEf8EgAAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:52.747457 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:46310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFUKQpVkWug9HeOt9ZPAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:55.082799 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFUlajLEzk2WiQ-105ZgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:56.475772 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:46340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFVM_BxrYCr4hPDw8R-QAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:58.048954 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:46356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFVbysWC90G-1nBrBrtgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:59.353500 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:45794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFV6TCbgAP5jq5TehRAwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:01.409472 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFWNSswJuvopo3lOiHuQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:02.734958 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:45806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFWqTCbgAP5jq5TehRCgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:03.900657 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:45808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFW6TCbgAP5jq5TehRDQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:05.181356 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:45816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFXVajLEzk2WiQ-105ZwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:09.521831 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:45820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFYdSswJuvopo3lOiHvgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:12.959589 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:57246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFZLABkC4fWIHEf8EgEgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:34:14.211208 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:37948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFZrysWC90G-1nBrBrwQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:40.975477 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:37954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFgP9ocpUE4ed4uDwZywAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:34:57.176271 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:54972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFkbABkC4fWIHEf8EgJgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:35:12.931467 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.244.31:38380] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiFoFajLEzk2WiQ-105eQAAApM"]
[Mon Mar 16 19:35:13.437497 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:39154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFodSswJuvopo3lOiH2AAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:35:21.455548 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFqf9ocpUE4ed4uDwZ2QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:35:23.805479 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:58760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFq7ABkC4fWIHEf8EgLgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:35:25.117943 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:58776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFrY6lpbStxTqkSkuOTgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:36:14.750927 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:58786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiF3v9ocpUE4ed4uDwaEAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:36:44.966523 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:35602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiF_Er9dMAiw-8KANNvVwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:37:15.370885 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:49712] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiGG9SswJuvopo3lOiIFgAAAJE"]
[Mon Mar 16 19:37:22.507428 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:46648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGItSswJuvopo3lOiIHwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:18.851697 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:59698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGWc_BxrYCr4hPDw8TIQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:24.023068 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:35788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGYFajLEzk2WiQ-106DwAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:30.245482 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:34320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGZkr9dMAiw-8KANNvagAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:41.008045 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:43254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGcVajLEzk2WiQ-106GgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:42.313108 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGckr9dMAiw-8KANNvbAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:43.665425 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:35260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGc6TCbgAP5jq5TehRsQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:57.524090 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:35270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGgc_BxrYCr4hPDw8TWAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:39:05.647779 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:37512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGif9ocpUE4ed4uDwadAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:39:19.272383 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:37526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGl7ysWC90G-1nBrBsnQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:40:09.780611 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:58346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGyf9ocpUE4ed4uDwa5gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:40:16.106882 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.244.31:43374] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiG0NSswJuvopo3lOiIjgAAAIg"]
[Mon Mar 16 19:40:26.082366 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:35492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG2s_BxrYCr4hPDw8TnAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:40:54.499736 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:58852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG9tSswJuvopo3lOiIzQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:41:00.143135 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:41052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG_LABkC4fWIHEf8EgkwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:41:05.583054 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:39262] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHAbABkC4fWIHEf8EgnQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:41:59.294427 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:46098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHN7ysWC90G-1nBrBtDQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:42:02.626933 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:44592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHOo6lpbStxTqkSkuOnQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:42:14.980185 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:44600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHRlajLEzk2WiQ-106YwAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:42:16.137570 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.228.16:33086] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiHSM_BxrYCr4hPDw8TvwAAAcc"]
[Mon Mar 16 19:42:22.282726 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:39264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHTqTCbgAP5jq5TehSeAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:43:09.832734 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:45112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHff9ocpUE4ed4uDwbZwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:43:12.275850 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:38000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHgM_BxrYCr4hPDw8UCwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:44:24.315678 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:38006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHyEr9dMAiw-8KANNv-gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:44:30.942593 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:51272] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHzrysWC90G-1nBrBtOAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:38.064742 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:37102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH1v9ocpUE4ed4uDwbxAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:39.347253 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:45872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH17ABkC4fWIHEf8EhPQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:45.878484 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:43318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH3Ur9dMAiw-8KANNwBwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:45:08.419154 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:37962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH9I6lpbStxTqkSkuO4gAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:45:09.756541 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:53466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH9aQpVkWug9HeOt9Z9AAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:16.140085 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.244.31:33108] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiH_I6lpbStxTqkSkuO5AAAAko"]
[Mon Mar 16 19:45:19.659331 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:53476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH__9ocpUE4ed4uDwb9wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:44.121609 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:56078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIGNSswJuvopo3lOiJiQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:45.320998 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:56042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIGdSswJuvopo3lOiJiwAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:46:43.873192 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:57844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIU1ajLEzk2WiQ-1063AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:46:47.443684 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIV0r9dMAiw-8KANNwJQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:47:16.949778 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:53638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiIdI6lpbStxTqkSkuPRgAAAlM"]
[Mon Mar 16 19:47:37.108390 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:58472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIiaTCbgAP5jq5TehTBAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:47:44.726304 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:52372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIkFajLEzk2WiQ-1068AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:47:52.494062 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:52376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiImP9ocpUE4ed4uDwcRwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:47:53.810470 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:55896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiImaQpVkWug9HeOt9abQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:48:31.199638 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:33310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIv7ysWC90G-1nBrBtsQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:48:34.675412 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:34514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIwqQpVkWug9HeOt9afwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:48:37.096412 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIxbABkC4fWIHEf8EhrwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:00.644231 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:50968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJVP9ocpUE4ed4uDwc3QAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:50.035015 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:59406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJhv9ocpUE4ed4uDwc-wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:55.495040 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:53640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJi46lpbStxTqkSkuPuAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:52:23.060244 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.228.16:52234] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiJp6TCbgAP5jq5TehTOgAAAsk"]
[Mon Mar 16 19:55:18.864222 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.244.31:50326] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiKVkr9dMAiw-8KANNxAwAAAQA"]
[Mon Mar 16 19:57:51.260639 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.228.16:39944] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiK76QpVkWug9HeOt9bEAAAA08"]
[Mon Mar 16 20:00:24.135509 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44224] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiLiNSswJuvopo3lOiK2QAAAIU"]
[Mon Mar 16 20:03:00.530803 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.228.16:60100] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiMJLABkC4fWIHEf8EjLAAAAFY"]
[Mon Mar 16 20:05:46.979191 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.244.31:40938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiMys_BxrYCr4hPDw8V-QAAAco"]
[Mon Mar 16 20:08:15.975891 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.228.16:49562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiNX7ABkC4fWIHEf8Ej-QAAAFQ"]
[Mon Mar 16 20:10:52.814849 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:33356] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiN_I6lpbStxTqkSkuREAAAAkw"]
[Mon Mar 16 20:13:25.317186 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.228.16:51688] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiOk1ajLEzk2WiQ-1081wAAAok"]
[Mon Mar 16 20:15:52.925355 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.244.31:42448] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiPKI6lpbStxTqkSkuRZwAAAlc"]
[Mon Mar 16 20:20:53.137478 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.244.31:50916] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiQVUr9dMAiw-8KANNyjQAAARc"]
[Mon Mar 16 20:29:17.706870 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.228.16:58010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiSTaQpVkWug9HeOt9dCgAAA0Q"]
[Mon Mar 16 20:31:11.692967 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:48716] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiSv46lpbStxTqkSkuR4QAAAlI"]
[Mon Mar 16 20:34:26.335882 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.228.16:32864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiTgkr9dMAiw-8KANNzTQAAARQ"]
[Mon Mar 16 20:36:14.121975 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.244.31:36736] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiT7kr9dMAiw-8KANNzYQAAARU"]
[Mon Mar 16 20:39:58.076079 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.228.16:34738] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiUzo6lpbStxTqkSkuSJwAAAkg"]
[Mon Mar 16 20:41:14.755265 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.244.31:41326] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiVGrysWC90G-1nBrBwlgAAAZc"]
[Mon Mar 16 20:45:07.043815 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.228.16:48566] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiWA6TCbgAP5jq5TehWpgAAAsg"]
[Mon Mar 16 20:46:18.890655 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.244.31:52850] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiWSrysWC90G-1nBrBxLAAAAZQ"]
[Mon Mar 16 20:50:28.487307 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.228.16:48416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiXRKTCbgAP5jq5TehW-gAAAtU"]
[Mon Mar 16 20:55:31.273524 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.228.16:38954] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiYc8_BxrYCr4hPDw8YwwAAAck"]
[Mon Mar 16 20:56:23.920087 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:35808] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiYp9SswJuvopo3lOiOggAAAJg"]
[Mon Mar 16 21:00:52.871359 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:33016] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiZtLABkC4fWIHEf8EphwAAAE8"]
[Mon Mar 16 21:01:32.470350 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.244.31:47538] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiZ3FajLEzk2WiQ-11A3AAAApU"]
[Mon Mar 16 21:06:01.935021 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.228.16:44842] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abia6bysWC90G-1nBrByFwAAAY0"]
[Mon Mar 16 21:06:43.691783 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:48660] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abibE7ABkC4fWIHEf8Ep6QAAAEI"]
[Mon Mar 16 21:11:26.487429 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.228.16:41526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abicLtSswJuvopo3lOiPYQAAAJA"]
[Mon Mar 16 21:11:47.950679 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.244.31:47952] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abicQ_9ocpUE4ed4uDwiKwAAAgk"]
[Mon Mar 16 21:16:29.345241 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.228.16:59730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abidXUr9dMAiw-8KANN2fgAAAQQ"]
[Mon Mar 16 21:16:48.866883 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.244.31:43950] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abidcM_BxrYCr4hPDw8ZzQAAAcs"]
[Mon Mar 16 21:21:56.422916 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.244.31:39664] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiepKTCbgAP5jq5TehZMgAAAtE"]
[Mon Mar 16 21:32:13.827480 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.228.16:48248] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abihDVajLEzk2WiQ-11DRAAAAo0"]
[Mon Mar 16 21:32:40.362831 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.244.31:40634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abihKEr9dMAiw-8KANN3mgAAAQc"]
[Mon Mar 16 21:37:17.600297 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.228.16:35062] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiiPf9ocpUE4ed4uDwjVAAAAgA"]
[Mon Mar 16 21:37:43.669132 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:47068] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiiV7ABkC4fWIHEf8Er7QAAAFY"]
[Mon Mar 16 21:42:38.467225 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.228.16:40656] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abijftSswJuvopo3lOiQzAAAAJU"]
[Mon Mar 16 21:43:00.979113 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.244.31:34486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abijlKQpVkWug9HeOt9gxgAAA0k"]
[Mon Mar 16 21:47:50.807549 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:42796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abikto6lpbStxTqkSkuVygAAAlQ"]
[Mon Mar 16 21:48:16.098445 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.244.31:35522] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abik0KTCbgAP5jq5Teha2AAAAtQ"]
[Mon Mar 16 21:53:05.214654 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.228.16:42800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abil8f9ocpUE4ed4uDwkvQAAAhY"]
[Mon Mar 16 21:54:41.369594 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:50732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abimUY6lpbStxTqkSkuWcQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 21:55:23.146652 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:40086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abime6TCbgAP5jq5TehbLgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 21:58:27.990224 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.228.16:48730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abinM7ABkC4fWIHEf8EtmgAAAFI"]
[Mon Mar 16 21:58:43.170508 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.244.31:37084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abinQ_9ocpUE4ed4uDwlYQAAAgA"]
[Mon Mar 16 21:59:58.904717 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abinjqQpVkWug9HeOt9ifAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:01:17.946159 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:35022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abin3bysWC90G-1nBrB1NgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:16.811211 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:38058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioVI6lpbStxTqkSkuXkAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:20.234500 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:42760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioWFajLEzk2WiQ-11FGwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:21.522883 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:42766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioWc_BxrYCr4hPDw8cVwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:23.751369 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioW_9ocpUE4ed4uDwmRQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:27.158195 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:42774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioX6QpVkWug9HeOt9izAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:27.532772 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.228.16:41054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abioX0r9dMAiw-8KANN6tAAAAQw"]
[Mon Mar 16 22:03:42.373449 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:42754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiobkr9dMAiw-8KANN6wwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:42.658944 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.244.31:36608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiobqTCbgAP5jq5TehcjAAAAtc"]
[Mon Mar 16 22:03:44.042462 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:59792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiocLysWC90G-1nBrB1ZAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:47.514646 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:59712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioc7ABkC4fWIHEf8EuaAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:48.817115 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:39670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiodNSswJuvopo3lOiSvQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:54.527112 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:39678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioerysWC90G-1nBrB1cwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:55.855319 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:39690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioe46lpbStxTqkSkuXnAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:59.888687 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:39706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiof46lpbStxTqkSkuXoAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:04:01.231589 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:54062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiogbABkC4fWIHEf8EucQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:06:06.156889 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:34090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abio_kr9dMAiw-8KANN7DgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:07.475079 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:49354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abio_7ABkC4fWIHEf8EurwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:08.807413 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:49368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipAKQpVkWug9HeOt9i9wAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:11.213048 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:43106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipA8_BxrYCr4hPDw8ckgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:13.615391 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:43122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipBaQpVkWug9HeOt9i-gAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:59.802690 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:49218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipM0r9dMAiw-8KANN7QwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:03.686137 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:49218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipN0r9dMAiw-8KANN7RwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:40.583454 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:43124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXP9ocpUE4ed4uDwnMgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:41.166763 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:59004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXaQpVkWug9HeOt9jKQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:41.882983 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXbABkC4fWIHEf8Eu0wAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:42.060200 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXrABkC4fWIHEf8Eu1AAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:43.443453 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:52128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipX6TCbgAP5jq5TehdFAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:44.615790 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:51042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYFajLEzk2WiQ-11FcQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:44.749395 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:52144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYKQpVkWug9HeOt9jLAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:45.916062 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:52154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYbABkC4fWIHEf8Eu1gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:49.691069 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:51046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipZaTCbgAP5jq5TehdHgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:52.806857 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:52164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipaEr9dMAiw-8KANN7XAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:53.135430 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:41072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipadSswJuvopo3lOiTZQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:54.168018 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:59104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipakr9dMAiw-8KANN7XQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:55.782724 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:59106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipa8_BxrYCr4hPDw8crwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:58.188586 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:59110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipbtSswJuvopo3lOiTZwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:00.657623 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipb_9ocpUE4ed4uDwnOQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:08:02.918246 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:58462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipco6lpbStxTqkSkuX4gAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:03.068788 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:59122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipc9SswJuvopo3lOiTbgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:04.114411 2026] [core:alert] [pid 10831:tid 140411674785536] [client 74.7.241.46:58472] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/sys
[Mon Mar 16 22:08:06.919761 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:58476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipdY6lpbStxTqkSkuX6AAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:10.312362 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipeo6lpbStxTqkSkuX7AAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:11.596467 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:51254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipe0r9dMAiw-8KANN7YgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:12.794941 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:51258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipfFajLEzk2WiQ-11FeAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:15.151565 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:51264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipf9SswJuvopo3lOiTcgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:17.503827 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:51278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipgbABkC4fWIHEf8Eu5wAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:19.096087 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:51278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipg7ABkC4fWIHEf8Eu6wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:21.603100 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:43986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiphbABkC4fWIHEf8Eu7gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:22.902874 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:43994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiphtSswJuvopo3lOiTdgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:25.259712 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:43996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipif9ocpUE4ed4uDwnRwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:26.502322 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:44002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipitSswJuvopo3lOiTegAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:27.650858 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:44008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipi6TCbgAP5jq5TehdRwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:28.993279 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.243.203:44024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipjM_BxrYCr4hPDw8cuwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:29.371520 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.228.16:60706] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abipjf9ocpUE4ed4uDwnSwAAAhE"]
[Mon Mar 16 22:08:30.315111 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:34796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipjs_BxrYCr4hPDw8cvQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:32.551004 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipkFajLEzk2WiQ-11FhQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:33.983067 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:51936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipkc_BxrYCr4hPDw8cvgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:35.006506 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:34812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipk6TCbgAP5jq5TehdTAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:37.855281 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:34818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipldSswJuvopo3lOiTggAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:38.863244 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:51940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiplkr9dMAiw-8KANN7cgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:40.315535 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:34830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipmM_BxrYCr4hPDw8cwwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:41.707130 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:40662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipmaTCbgAP5jq5TehdTQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:44.373694 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:51452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abipnNSswJuvopo3lOiTgwAAAIE"]
[Mon Mar 16 22:09:33.593799 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:40666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipzbysWC90G-1nBrB2dQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:09:39.297861 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:40666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip07ysWC90G-1nBrB2ewAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:41.726819 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.243.203:37302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip1c_BxrYCr4hPDw8c3AAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:44.232760 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:37310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip2M_BxrYCr4hPDw8c3gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:46.023030 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:37324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip2s_BxrYCr4hPDw8c3wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:56.121325 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:37332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip5I6lpbStxTqkSkuYEAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:58.091214 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:37332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip5I6lpbStxTqkSkuYEQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:59.451998 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:51984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip59SswJuvopo3lOiTlgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:01.951130 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:34372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip6f9ocpUE4ed4uDwnmQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:02.423482 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:34372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip6v9ocpUE4ed4uDwnmgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:03.086950 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:36882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip60r9dMAiw-8KANN7jwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:04.015087 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:36882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7Er9dMAiw-8KANN7kAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:06.313437 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:36892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7dSswJuvopo3lOiTmgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:06.343883 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:40726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7bysWC90G-1nBrB2hgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:09.117771 2026] [proxy_fcgi:error] [pid 29802:tid 140411590858496] (70007)The timeout specified has expired: [client 45.227.253.15:54744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:15.579267 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:46966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip97ABkC4fWIHEf8EvIQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:17.012568 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:46976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip-bABkC4fWIHEf8EvIgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:19.864926 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:45772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip-6QpVkWug9HeOt9jmQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:20.547517 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:36202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_P9ocpUE4ed4uDwnoQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:21.486231 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:45778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_bABkC4fWIHEf8EvJgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:22.145217 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:39004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_v9ocpUE4ed4uDwnpgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:22.775152 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_v9ocpUE4ed4uDwnqAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:23.589315 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:39018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip__9ocpUE4ed4uDwnqQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:25.466555 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:45798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAdSswJuvopo3lOiToAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:25.976197 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:39032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAaQpVkWug9HeOt9jpQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:26.770973 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAv9ocpUE4ed4uDwnqwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:28.031214 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:59994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqBM_BxrYCr4hPDw8c7QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:29.722958 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:60002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqBaQpVkWug9HeOt9jsgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:31.145772 2026] [proxy_fcgi:error] [pid 15061:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44354] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:52.081899 2026] [proxy_fcgi:error] [pid 29507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:53.099717 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:39034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqHaQpVkWug9HeOt9jzAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:54.130751 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:60946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqHkr9dMAiw-8KANN7pAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:13.137857 2026] [proxy_fcgi:error] [pid 29507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:15.529767 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqM9SswJuvopo3lOiTrwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:34.130170 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:36.081603 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSKTCbgAP5jq5TehdcAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:36.749504 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSM_BxrYCr4hPDw8dAAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:37.236689 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSc_BxrYCr4hPDw8dAQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:37.827397 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:55296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSUr9dMAiw-8KANN7qwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:54.835230 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:41106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqWs_BxrYCr4hPDw8dBAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:55.154316 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:56.138411 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:41108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXLysWC90G-1nBrB2mQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:56.670234 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:37850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXEr9dMAiw-8KANN7rgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:57.663596 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:41114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXY6lpbStxTqkSkuYMwAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:58.854032 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:59338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXqQpVkWug9HeOt9j0wAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:00.039561 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:59342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqYLABkC4fWIHEf8EvPwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:16.417813 2026] [proxy_fcgi:error] [pid 15061:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:12:18.185166 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:42494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqcv9ocpUE4ed4uDwn_QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:19.259828 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:37852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqc46lpbStxTqkSkuYOgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:19.446571 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:42498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqc_9ocpUE4ed4uDwoAAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:21.787422 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:56208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqdY6lpbStxTqkSkuYPgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:38.121882 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47694] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:12:40.331416 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqiP9ocpUE4ed4uDwoFQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:40.331439 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:42514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqiNSswJuvopo3lOiTtgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:41.635289 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqidSswJuvopo3lOiTtwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:42.378875 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:57544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqilajLEzk2WiQ-11FvQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:43.675343 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:57556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqi6QpVkWug9HeOt9j1wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:59.121830 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48176] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:01.283073 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:58856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqndSswJuvopo3lOiTuwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:02.459550 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:58860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqntSswJuvopo3lOiTvAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:03.286301 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:54838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqn6TCbgAP5jq5TehdfgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:03.992678 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:58866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqn9SswJuvopo3lOiTvgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:05.235997 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:58880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqoaQpVkWug9HeOt9j2QAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:20.057974 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:22.408529 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqsbysWC90G-1nBrB2owAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:22.413306 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:37018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqsUr9dMAiw-8KANN7vAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:23.722500 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:49280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqs0r9dMAiw-8KANN7vwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:25.147024 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:49288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqtbABkC4fWIHEf8EvTgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:27.087499 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:58428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqt8_BxrYCr4hPDw8dEQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:31.963454 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:40950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiquo6lpbStxTqkSkuYTwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:31.964051 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:49290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqu7ABkC4fWIHEf8EvVQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:31.965061 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:52360] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiqu9SswJuvopo3lOiTwwAAAJI"]
[Mon Mar 16 22:13:33.999747 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:34646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqvVajLEzk2WiQ-11FwwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:36.774871 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:34650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqwLysWC90G-1nBrB2pwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:38.367536 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:43648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqwkr9dMAiw-8KANN7wAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:41.153782 2026] [proxy_fcgi:error] [pid 10651:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49288] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:42.471410 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:43650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqxs_BxrYCr4hPDw8dFgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:43.192377 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:40962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqx6TCbgAP5jq5TehdjgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:44.095663 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:43656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyLABkC4fWIHEf8EvVgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:46.000870 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:34856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyUr9dMAiw-8KANN7wgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:46.031936 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.244.31:35622] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiqyo6lpbStxTqkSkuYUQAAAkg"]
[Mon Mar 16 22:13:46.885339 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:43670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyqTCbgAP5jq5TehdkQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:49.702517 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:55336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqzY6lpbStxTqkSkuYUwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:02.129940 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:02.369777 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:55336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq2o6lpbStxTqkSkuYVwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:04.233800 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:50082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq3NSswJuvopo3lOiTyQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:04.643109 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:34872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq3FajLEzk2WiQ-11FzAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:08.303654 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:50086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq4KTCbgAP5jq5TehdlwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:08.947915 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq4Er9dMAiw-8KANN7xgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:11.045097 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:50738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq46QpVkWug9HeOt9j5gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:23.045904 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50452] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:25.696654 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:54300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq8Y6lpbStxTqkSkuYWwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:26.271840 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:37454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq8s_BxrYCr4hPDw8dHgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:27.201091 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:54300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq846lpbStxTqkSkuYXgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:28.925478 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:51620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq9LysWC90G-1nBrB2rwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:29.401822 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:53846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq9bysWC90G-1nBrB2sAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:31.103773 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.243.203:60148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq98_BxrYCr4hPDw8dIAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:44.061426 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:44.258598 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:51626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirBEr9dMAiw-8KANN70AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:48.071262 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:60156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirCFajLEzk2WiQ-11F1QAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:51.663823 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirC6TCbgAP5jq5TehdoAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:53.364097 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:56620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirDdSswJuvopo3lOiTzgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:03.002542 2026] [log_config:warn] [pid 21806:tid 140411658000128] (32)Broken pipe: [client 69.197.179.242:44182] AH00646: Error writing to |/etc/httpd/logger, referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Mon Mar 16 22:15:03.340066 2026] [ssl:warn] [pid 6229:tid 140412349433728] AH01909: bandeirantesbomb3.hospedagemdesites.ws:443:0 server certificate does NOT include an ID which matches the server name
[Mon Mar 16 22:15:05.846624 2026] [log_config:warn] [pid 15061:tid 140411658000128] (32)Broken pipe: [client 74.7.241.46:56636] AH00646: Error writing to |/etc/httpd/logger, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Mon Mar 16 22:15:06.357876 2026] [proxy_fcgi:error] [pid 15061:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51610] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:06.358192 2026] [log_config:warn] [pid 15061:tid 140411548894976] (32)Broken pipe: [client 179.188.53.243:51610] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:06.550180 2026] [log_config:warn] [pid 29802:tid 140411699963648] (32)Broken pipe: [client 74.7.243.203:59840] AH00646: Error writing to |/etc/httpd/logger, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt
[Mon Mar 16 22:15:07.575824 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:55426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirGwQohV2v-7oj5HG81AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:08.846745 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:42726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirHAQohV2v-7oj5HG81gAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:15:18.763378 2026] [:error] [pid 2305:tid 140411691570944] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirJgQohV2v-7oj5HG84AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:28.000695 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:43446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirL6BJNF7axNlVR0W6WwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:15:28.057834 2026] [proxy_fcgi:error] [pid 10831:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52352] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:28.058135 2026] [log_config:warn] [pid 10831:tid 140411741927168] (32)Broken pipe: [client 179.188.53.243:52352] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:28.789001 2026] [:error] [pid 2304:tid 140411725141760] [client 74.7.243.203:44870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirMMh3JZxwdBQwPYGyVQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:30.463254 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:34448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirMu82sZHvlq4xgHqAsQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:31.763453 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:34460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirM6BJNF7axNlVR0W6XgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:33.426883 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:34462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirNaBJNF7axNlVR0W6YAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:33.627435 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:34462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirNaBJNF7axNlVR0W6YQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:37.626028 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:34468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirOQQohV2v-7oj5HG87QAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:51.125789 2026] [proxy_fcgi:error] [pid 29802:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52904] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:51.126066 2026] [log_config:warn] [pid 29802:tid 140411590858496] (32)Broken pipe: [client 179.188.53.243:52904] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:52.189396 2026] [:error] [pid 2304:tid 140411607643904] [client 74.7.243.203:34476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirSMh3JZxwdBQwPYGydQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:56.631453 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:53922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTO82sZHvlq4xgHqAuwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:57.370880 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.241.46:55970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTch3JZxwdBQwPYGyfgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:59.531712 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:53926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTwQohV2v-7oj5HG88QAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:01.260823 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:54788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirUaBJNF7axNlVR0W6dAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:02.729894 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:54804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirUqBJNF7axNlVR0W6eAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:15.129866 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:15.130123 2026] [log_config:warn] [pid 10831:tid 140411725141760] (32)Broken pipe: [client 179.188.53.243:53362] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:19.417010 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:56756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirY6BJNF7axNlVR0W6hQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:24.867803 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:36936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiraO82sZHvlq4xgHqAxwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:37.123378 2026] [proxy_fcgi:error] [pid 15568:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:37.123600 2026] [log_config:warn] [pid 15568:tid 140411599251200] (32)Broken pipe: [client 179.188.53.243:53622] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:40.812186 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.243.203:34108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abireMh3JZxwdBQwPYGyqAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:42.624229 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.243.203:35406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiregQohV2v-7oj5HG9CQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:44.126987 2026] [:error] [pid 2304:tid 140411557287680] [client 74.7.243.203:35420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirfMh3JZxwdBQwPYGyrQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:46.780955 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:35428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirfqBJNF7axNlVR0W6lgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:54.567129 2026] [mime_magic:error] [pid 2473:tid 140411741927168] (70014)End of file found: [client 74.7.241.46:59550] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/systemd/system
[Mon Mar 16 22:16:55.560034 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:38820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirhwQohV2v-7oj5HG9EAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:59.057834 2026] [proxy_fcgi:error] [pid 10831:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53874] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:59.058178 2026] [log_config:warn] [pid 10831:tid 140411708356352] (32)Broken pipe: [client 179.188.53.243:53874] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:59.522553 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:38826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiri-82sZHvlq4xgHqBCQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:08.704279 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:36490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirlKBJNF7axNlVR0W6qQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:21.033864 2026] [proxy_fcgi:error] [pid 10831:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54080] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:17:21.034171 2026] [log_config:warn] [pid 10831:tid 140411632822016] (32)Broken pipe: [client 179.188.53.243:54080] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:17:22.341624 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:36092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiroqBJNF7axNlVR0W6rgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:24.802733 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:36096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirpKBJNF7axNlVR0W6sAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:26.227269 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:36102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirpsh3JZxwdBQwPYGy0wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:27.688840 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:36118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirp6BJNF7axNlVR0W6swAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:29.122963 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:36122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirqe82sZHvlq4xgHqBJgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:43.121836 2026] [proxy_fcgi:error] [pid 29507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54264] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:17:43.122148 2026] [log_config:warn] [pid 29507:tid 140411649607424] (32)Broken pipe: [client 179.188.53.243:54264] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:17:44.233638 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:48620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiruKBJNF7axNlVR0W6vQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:05.105845 2026] [proxy_fcgi:error] [pid 29802:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:05.106168 2026] [log_config:warn] [pid 29802:tid 140411548894976] (32)Broken pipe: [client 179.188.53.243:54478] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:06.911611 2026] [:error] [pid 2304:tid 140411632822016] [client 74.7.243.203:59520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirzsh3JZxwdBQwPYGy6AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:09.642975 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.243.203:38014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir0QQohV2v-7oj5HG9PAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:10.867534 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir0u82sZHvlq4xgHqBUgAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:12.199784 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:53044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir1Mh3JZxwdBQwPYGy7gAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:16.348472 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:53052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir2Mh3JZxwdBQwPYGy8gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:27.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54732] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:27.126103 2026] [log_config:warn] [pid 21805:tid 140411607643904] (32)Broken pipe: [client 179.188.53.243:54732] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:28.210883 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:43472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir5O82sZHvlq4xgHqBZQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:29.192818 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:49002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir5aBJNF7axNlVR0W62AAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:31.611169 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:56208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir56BJNF7axNlVR0W62wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:32.412962 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.228.16:43416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abir6KBJNF7axNlVR0W63gAAAAA"]
[Mon Mar 16 22:18:37.480281 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:56210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir7aBJNF7axNlVR0W66QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:40.203741 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:56226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir8AQohV2v-7oj5HG9SQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:44.919599 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.244.31:37992] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abir9O82sZHvlq4xgHqBdAAAApc"]
[Mon Mar 16 22:18:47.550985 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:50616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir96BJNF7axNlVR0W69gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:49.065801 2026] [proxy_fcgi:error] [pid 15568:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54966] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:49.066057 2026] [log_config:warn] [pid 15568:tid 140411658000128] (32)Broken pipe: [client 179.188.53.243:54966] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:53.041245 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:50622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir_aBJNF7axNlVR0W6-wAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:58.308864 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:34454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisAgQohV2v-7oj5HG9UwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:11.106089 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:11.106416 2026] [log_config:warn] [pid 21805:tid 140411708356352] (32)Broken pipe: [client 179.188.53.243:55208] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:18.449644 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:59778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisFsh3JZxwdBQwPYGy_gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:33.131031 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55380] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:33.131363 2026] [log_config:warn] [pid 10772:tid 140411574073088] (32)Broken pipe: [client 179.188.53.243:55380] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:40.316782 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:59778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisLMh3JZxwdBQwPYGzDgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:42.915046 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.243.203:46366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisLsh3JZxwdBQwPYGzFAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:19:55.401831 2026] [proxy_fcgi:error] [pid 29507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:55.402177 2026] [log_config:warn] [pid 29507:tid 140411658000128] (32)Broken pipe: [client 179.188.53.243:55608] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:56.408577 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisPAQohV2v-7oj5HG9ZQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:20:17.777919 2026] [core:alert] [pid 2473:tid 140411565680384] [client 74.7.241.46:42460] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Mon Mar 16 22:20:18.121800 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55844] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:20:39.126221 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56166] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:02.129815 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56434] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:24.077875 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56652] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:46.126619 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:08.121784 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:31.125961 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57292] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:53.066969 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57588] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:54.163421 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:34566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abis7u82sZHvlq4xgHqCgQAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:22:56.930175 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:54014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abis8O82sZHvlq4xgHqChAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:23:15.125803 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57794] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:23:17.221566 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.241.46:55708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitBO82sZHvlq4xgHqCiwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:19.456858 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:50860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitBwQohV2v-7oj5HG9sgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:20.939393 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:50870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitCO82sZHvlq4xgHqCjQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:22.185583 2026] [:error] [pid 4740:tid 140411632822016] [client 74.7.241.46:50874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitCgfYLcKp6Sb5AeL1nQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:23.838048 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.241.46:50884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitC8h3JZxwdBQwPYGzZQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:34.779366 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:33058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitFgQohV2v-7oj5HG9vgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:36.312337 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.241.46:33074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitGAQohV2v-7oj5HG9vwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:37.125814 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57992] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:23:37.749051 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.241.46:33078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitGQfYLcKp6Sb5AeL1pgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:40.516256 2026] [:error] [pid 4740:tid 140411691570944] [client 74.7.241.46:37642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHAfYLcKp6Sb5AeL1qAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:40.983887 2026] [:error] [pid 2304:tid 140411666392832] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHMh3JZxwdBQwPYGzcAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:23:41.835210 2026] [:error] [pid 4740:tid 140411649607424] [client 74.7.241.46:37650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHQfYLcKp6Sb5AeL1qgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:42.339884 2026] [:error] [pid 4740:tid 140411616036608] [client 74.7.241.46:37650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHgfYLcKp6Sb5AeL1rAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:44.445773 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:55676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitIKBJNF7axNlVR0W75AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:23:44.445970 2026] [:error] [pid 4740:tid 140411624429312] [client 74.7.241.46:37662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHwfYLcKp6Sb5AeL1rgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:45.749359 2026] [:error] [pid 4740:tid 140411607643904] [client 74.7.244.31:47226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abitIQfYLcKp6Sb5AeL1rwAAAFA"]
[Mon Mar 16 22:23:46.434792 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:37666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitIu82sZHvlq4xgHqCkwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:58.121810 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:00.219349 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMMh3JZxwdBQwPYGzeQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:01.618658 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:45500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMQQohV2v-7oj5HG9yQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:01.898334 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:45500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMQQohV2v-7oj5HG9ygAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:03.432438 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:45506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitM6BJNF7axNlVR0W77QAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:04.806155 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.241.46:45510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitNMh3JZxwdBQwPYGzfQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:06.228756 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:45520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitNu82sZHvlq4xgHqCqgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:07.681201 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:45534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitN6BJNF7axNlVR0W78QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:18.855153 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:48276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitQgQohV2v-7oj5HG91wAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:20.057869 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:21.371035 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:48282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitRQQohV2v-7oj5HG93QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:24.773624 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:48292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitRwQohV2v-7oj5HG93wAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:26.793641 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:48306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitSqBJNF7axNlVR0W7-gAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:29.445786 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:49444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitTe82sZHvlq4xgHqCwAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:29.913494 2026] [:error] [pid 2304:tid 140411540502272] [client 74.7.243.203:55692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitTch3JZxwdBQwPYGzkwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:31.573437 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:51770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitT6BJNF7axNlVR0W8AQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:42.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:43.253356 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.241.46:49456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitW8h3JZxwdBQwPYGzmQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:46.264535 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:46350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitXqBJNF7axNlVR0W8CwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:46.769232 2026] [:error] [pid 2304:tid 140411649607424] [client 74.7.243.203:44870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitXsh3JZxwdBQwPYGzmwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:48.745099 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:55970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYKBJNF7axNlVR0W8DwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:50.028164 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.241.46:55976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYgQohV2v-7oj5HG97wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:50.099443 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.243.203:50982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYsh3JZxwdBQwPYGzngAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:53.211474 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:50998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitZaBJNF7axNlVR0W8EgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:04.137830 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58848] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:25:05.195877 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.241.46:55982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitcQQohV2v-7oj5HG98wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:09.876279 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:47798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitdaBJNF7axNlVR0W8HAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:11.195209 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.241.46:47808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitd8h3JZxwdBQwPYGz1QAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:11.727695 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:33138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitd6BJNF7axNlVR0W8HgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:12.636147 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:47824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiteAQohV2v-7oj5HG99AAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:18.339810 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:47826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitfu82sZHvlq4xgHqC7wAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:25:20.637264 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:33138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgKBJNF7axNlVR0W8JgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:21.275465 2026] [:error] [pid 2304:tid 140411649607424] [client 74.7.241.46:54930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgch3JZxwdBQwPYGz2AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:22.954845 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:54942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgqBJNF7axNlVR0W8JwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:25.796416 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:59792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abithe82sZHvlq4xgHqC-AAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:26.132739 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:25:27.959589 2026] [:error] [pid 2304:tid 140411658000128] [client 74.7.241.46:54956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abith8h3JZxwdBQwPYGz3AAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:25:29.966746 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.243.203:59796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitiQQohV2v-7oj5HG9-wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:48.125827 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:11.123265 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59452] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:15.167791 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.241.46:33762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitt8h3JZxwdBQwPYGz_gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:26:33.125980 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:55.133785 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59858] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:02.681671 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:57504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit5gQohV2v-7oj5HG-HQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:04.568154 2026] [:error] [pid 2304:tid 140411607643904] [client 74.7.241.46:57502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit6Mh3JZxwdBQwPYG0EwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:17.128676 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:21.366841 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.241.46:57510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit-ch3JZxwdBQwPYG0IAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:39.103933 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60224] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:43.805055 2026] [:error] [pid 4740:tid 140411574073088] [client 74.7.241.46:53922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuDwfYLcKp6Sb5AeL2AwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:45.627500 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuEQQohV2v-7oj5HG-JQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:48.325048 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:44504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuFO82sZHvlq4xgHqDOQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:50.072299 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.241.46:35058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuFgfYLcKp6Sb5AeL2BQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:01.125806 2026] [proxy_fcgi:error] [pid 4740:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:28:02.238722 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:35064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuIgQohV2v-7oj5HG-KQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:05.304409 2026] [:error] [pid 2304:tid 140411699963648] [client 74.7.241.46:44028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuJch3JZxwdBQwPYG0PgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:07.936109 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.241.46:44044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuJ-82sZHvlq4xgHqDQAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:08.643322 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.243.203:58484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKMh3JZxwdBQwPYG0RQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:28:09.699368 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:50542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKQQohV2v-7oj5HG-KwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:10.976807 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:50544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKqBJNF7axNlVR0W8pAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:14.849405 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:50558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuLgQohV2v-7oj5HG-LgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:23.129827 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:28:33.612614 2026] [:error] [pid 4740:tid 140411565680384] [client 74.7.241.46:53972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuQQfYLcKp6Sb5AeL2GQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:35.260323 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:41662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuQ6BJNF7axNlVR0W8rwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:41.827718 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:41676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuSe82sZHvlq4xgHqDXQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:43.282887 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:55524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuS-82sZHvlq4xgHqDXwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:44.555765 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:55536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuTKBJNF7axNlVR0W8uAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:45.131881 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:07.125822 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32866] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:30.141871 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33088] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:52.137786 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33330] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:56.699948 2026] [:error] [pid 4740:tid 140411632822016] [client 74.7.241.46:55538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiulAfYLcKp6Sb5AeL2VAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:29:58.441699 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:45926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiulqBJNF7axNlVR0W82wAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:14.137333 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:30:16.044896 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.46:45938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuqKBJNF7axNlVR0W86QAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:26.347172 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:45938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiusqBJNF7axNlVR0W88AAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:27.084496 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:36326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abius-82sZHvlq4xgHqDpgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:30:36.088481 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:30:48.341340 2026] [:error] [pid 2304:tid 140411708356352] [client 74.7.241.46:42946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuyMh3JZxwdBQwPYG01wAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:55.223983 2026] [core:alert] [pid 4740:tid 140411590858496] [client 66.249.74.169:45946] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 22:30:58.125864 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33960] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:31:01.371780 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:42448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiu1e82sZHvlq4xgHqDuQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:31:02.716688 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.241.46:42450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiu1u82sZHvlq4xgHqDvAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:31:21.139865 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34178] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:31:43.122089 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:00.841656 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:42466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivEAQohV2v-7oj5HG-jAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:32:05.125919 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34582] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:11.984184 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:48772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivG-82sZHvlq4xgHqD-AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:17.674996 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.243.203:50728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivIch3JZxwdBQwPYG0_wAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:27.126034 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:34.327572 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.243.203:59120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivMgQohV2v-7oj5HG-mwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:51.121954 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:56.909412 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:40950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivSKBJNF7axNlVR0W9NwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:59.545417 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:56926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivS-82sZHvlq4xgHqEDgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:00.892085 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.243.203:33484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivTAfYLcKp6Sb5AeL3BgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:13.054015 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:14.216314 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:33496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivWqBJNF7axNlVR0W9QwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:19.576249 2026] [:error] [pid 4740:tid 140411691570944] [client 74.7.243.203:44554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivXwfYLcKp6Sb5AeL3FwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:22.709834 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:52614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivYsh3JZxwdBQwPYG1KwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:35.137823 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:40.345655 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.228.16:35652] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abivdAfYLcKp6Sb5AeL3IwAAAFg"]
[Mon Mar 16 22:33:45.776439 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:52622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiveaBJNF7axNlVR0W9WgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:47.501497 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.243.203:34072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abive8h3JZxwdBQwPYG1QwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:33:56.129782 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35810] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:58.914141 2026] [:error] [pid 2304:tid 140411616036608] [client 74.7.244.31:60540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abivhsh3JZxwdBQwPYG1SwAAAI8"]
[Mon Mar 16 22:34:08.462954 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:42740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivkAQohV2v-7oj5HG_DgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:18.158326 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36084] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:34:19.421253 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:52578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivm-82sZHvlq4xgHqEWQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:23.034011 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:47152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivnwQohV2v-7oj5HG_IwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:24.300696 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.243.203:47162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivoAfYLcKp6Sb5AeL3RQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:27.405850 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:47164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivosh3JZxwdBQwPYG1VwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:40.121781 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36348] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:34:42.294742 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:47172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivsqBJNF7axNlVR0W9fgAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:35:02.689822 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36584] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:35:25.045822 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36810] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:35:47.116673 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37102] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:09.145272 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37392] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:32.069929 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:55.129849 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:37:17.114638 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:37:39.135590 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38552] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:02.129835 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38890] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:24.125933 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:46.133816 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39650] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:46.222766 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.228.16:37938] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiwpgQohV2v-7oj5HHAAQAAAZM"]
[Mon Mar 16 22:39:08.116063 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:39:08.744239 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.244.31:58606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiwvAQohV2v-7oj5HHAHAAAAZg"]
[Mon Mar 16 22:39:30.129799 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:39:58.139714 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40902] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:40:21.149832 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41280] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:40:42.125795 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:03.105818 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42242] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:24.132118 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42602] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:47.129793 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:08.574925 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:30.128162 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43782] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:51.125767 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44200] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:12.092580 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44504] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:34.129862 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44886] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:50.416160 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.228.16:44300] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abix1gQohV2v-7oj5HHBMQAAAYs"]
[Mon Mar 16 22:43:55.129811 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45252] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:16.129861 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:21.903358 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.244.31:33602] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abix9QQohV2v-7oj5HHBRgAAAYs"]
[Mon Mar 16 22:44:37.109582 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:58.069832 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:45:24.121772 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:45:45.130150 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:07.125774 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:29.145874 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:51.125800 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:12.129805 2026] [proxy_fcgi:error] [pid 11469:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:33.077927 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50202] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:55.102311 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:48:17.127427 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:48:39.169953 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:01.130475 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51652] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:11.983483 2026] [:error] [pid 4740:tid 140411565680384] [client 74.7.228.16:51450] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abizFwfYLcKp6Sb5AeL6JQAAAFU"]
[Mon Mar 16 22:49:23.122042 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52018] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:44.129779 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:05.149834 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:26.149778 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53136] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:26.305610 2026] [:error] [pid 2304:tid 140411708356352] [client 74.7.244.31:38852] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abizYsh3JZxwdBQwPYG3yAAAAIQ"]
[Mon Mar 16 22:50:29.817436 2026] [mime_magic:error] [pid 2304:tid 140411725141760] (70014)End of file found: [client 66.249.74.169:65001] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 22:50:48.121938 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:10.161778 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:33.110305 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:55.121828 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:16.121776 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55118] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:37.130121 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55540] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:59.045897 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:53:22.137900 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56196] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:53:44.123726 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:05.041995 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:12.504224 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:41282] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi0RJDEJR9VXonE_-0MQAAAAQ4"]
[Mon Mar 16 22:54:28.133987 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:50.045807 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57880] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:11.373779 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:33.132868 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58552] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:55.045855 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:56:16.053888 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:56:38.129325 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59700] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:01.129845 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:22.065887 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60332] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:43.057812 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:05.114518 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:26.129804 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:48.057845 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33654] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:09.125805 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:31.089841 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:36.397670 2026] [:error] [pid 2304:tid 140411557287680] [client 74.7.228.16:35514] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi1iMh3JZxwdBQwPYG4mwAAAJY"]
[Mon Mar 16 22:59:54.129815 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34706] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:16.102268 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35030] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:38.041906 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35216] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:45.110581 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.244.31:39252] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi1zQQohV2v-7oj5HHDVAAAAYg"]
[Mon Mar 16 23:00:59.125768 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35458] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:01:21.041896 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35690] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:01:43.102364 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35928] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:05.125819 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:27.118471 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:49.121902 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36496] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:11.125861 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36646] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:32.206603 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36842] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:55.025916 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37060] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:18.133832 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37176] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:39.145808 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:41.043884 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.228.16:52002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi2udCmCSWTlPouqoqNBgAAANE"]
[Mon Mar 16 23:05:00.157790 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:05:23.093827 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37620] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:05:45.130170 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37760] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:06.141900 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37950] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:08.340972 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:48002] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi3EMh3JZxwdBQwPYG5KwAAAJE"]
[Mon Mar 16 23:06:28.129833 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:49.131644 2026] [proxy_fcgi:error] [pid 4740:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38318] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:11.130604 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:33.123054 2026] [proxy_fcgi:error] [pid 2304:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38710] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:54.126051 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38978] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:16.126004 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:37.127453 2026] [proxy_fcgi:error] [pid 11469:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39440] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:58.126777 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:09:20.130361 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:09:43.064683 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:06.621814 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:08.218801 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:50634] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi4AJDEJR9VXonE_-0NogAAAQ4"]
[Mon Mar 16 23:10:28.141944 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:49.125823 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40660] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:11.117813 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:27.749424 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:42250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi4T6BJNF7axNlVR0XDYwAAABY"]
[Mon Mar 16 23:11:32.129795 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41102] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:54.049813 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:16.126646 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41596] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:37.125783 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:59.128680 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:13:21.117801 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:13:35.005023 2026] [core:alert] [pid 2305:tid 140411658000128] [client 66.249.74.160:35603] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 23:13:42.033829 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:03.057973 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42532] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:24.131431 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:46.134011 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42912] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:08.150790 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:19.217324 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:50298] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi5N9CmCSWTlPouqoqOegAAANM"]
[Mon Mar 16 23:15:30.127275 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:52.033967 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:13.141783 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:35.116670 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.244.31:58576] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi5g6BJNF7axNlVR0XECgAAAAQ"]
[Mon Mar 16 23:16:36.123313 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:58.139055 2026] [proxy_fcgi:error] [pid 4740:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44126] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:17:20.133783 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:17:42.137787 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44800] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:03.053829 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:25.121942 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:46.054200 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45722] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:08.129817 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45974] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:30.121861 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:52.132207 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:13.121816 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:35.131809 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46846] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:41.490129 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.228.16:46484] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi6ech3JZxwdBQwPYG6-gAAAIM"]
[Mon Mar 16 23:20:57.125870 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47010] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:18.133997 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47218] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:39.033841 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47466] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:55.627450 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.244.31:58282] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi6w-82sZHvlq4xgHqJlQAAAo0"]
[Mon Mar 16 23:22:00.041812 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:22:22.133400 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:22:43.121859 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:05.137788 2026] [proxy_fcgi:error] [pid 2304:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:26.134509 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:32.513683 2026] [mime_magic:error] [pid 2473:tid 140411691570944] (70014)End of file found: [client 66.249.74.169:51131] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:23:48.125806 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48670] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:07.655358 2026] [mime_magic:error] [pid 2473:tid 140411616036608] (70014)End of file found: [client 66.249.74.161:51544] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:24:09.126395 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:32.117809 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49110] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:54.069884 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:25:16.121819 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49636] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:25:38.130425 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49726] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:00.048902 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49918] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:22.121823 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50212] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:44.129947 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:00.230823 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:38568] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi79KBJNF7axNlVR0XEtwAAABY"]
[Mon Mar 16 23:27:05.325682 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50646] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:27.141772 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50854] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:50.037810 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51072] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:13.123056 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:34.129811 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:55.133811 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51706] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:16.121827 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:37.133799 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:58.108776 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52554] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:30:20.132444 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52886] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:30:42.129885 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53060] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:08.134743 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53250] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:30.037842 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53392] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:51.129963 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:59.404168 2026] [mime_magic:error] [pid 11469:tid 140411741927168] (70014)End of file found: [client 66.249.74.169:38391] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:32:12.073856 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:32:34.123249 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53990] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:32:55.073832 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54152] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:33:16.121785 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54246] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:33:39.124497 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54420] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:01.129791 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54680] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:23.131316 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:44.129779 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54976] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:05.121833 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:26.120054 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55366] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:47.137794 2026] [proxy_fcgi:error] [pid 2325:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55568] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:08.125894 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55734] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:11.463207 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.228.16:42062] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi-G5DEJR9VXonE_-0Q9QAAARI"]
[Mon Mar 16 23:36:31.121793 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55912] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:54.122892 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:15.106832 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:37.069833 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:37.252309 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.244.31:55732] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi-cZDEJR9VXonE_-0RBgAAARQ"]
[Mon Mar 16 23:37:59.125876 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:21.134256 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56874] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:43.122128 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57076] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:54.753346 2026] [mime_magic:error] [pid 4740:tid 140411674785536] (70014)End of file found: [client 66.249.74.160:60671] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/shop/pg/81establishment/30035
[Mon Mar 16 23:39:04.069839 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57290] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:39:26.133784 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:39:48.122602 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57692] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:10.105911 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57958] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:32.057814 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58098] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:53.139169 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58258] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:15.125844 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58422] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:32.014939 2026] [:error] [pid 2304:tid 140411666392832] [client 74.7.228.16:59378] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi_XMh3JZxwdBQwPYG8eQAAAIk"]
[Mon Mar 16 23:41:36.131722 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58550] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:58.121965 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:42:21.113626 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:42:43.155422 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:00.103123 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.31:54206] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi_tKBJNF7axNlVR0XFqwAAAAU"]
[Mon Mar 16 23:43:04.102018 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:26.065894 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:47.135027 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59756] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:08.127934 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59950] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:30.053886 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60094] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:30.388871 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] [client 103.214.142.103:55091] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/admin.php
[Mon Mar 16 23:44:51.121816 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60310] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:13.125824 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60530] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:34.125544 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60684] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:56.129793 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60900] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:17.131120 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32798] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:38.128644 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32972] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:42.487512 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.228.16:33796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjAkqBJNF7axNlVR0XF9QAAAAs"]
[Mon Mar 16 23:47:01.045840 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33162] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:47:22.145779 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33356] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:47:43.115280 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:03.561235 2026] [:error] [pid 4740:tid 140411590858496] [client 74.7.244.31:38508] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjA4wfYLcKp6Sb5AeL_eAAAAFI"]
[Mon Mar 16 23:48:05.109443 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:26.045876 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:47.133810 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:08.045975 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34382] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:30.125822 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:52.125802 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34828] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:14.129820 2026] [proxy_fcgi:error] [pid 11469:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:35.057876 2026] [proxy_fcgi:error] [pid 4740:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35186] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:56.121009 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:51:17.929808 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35558] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:51:40.611099 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:02.133864 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:14.440412 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.228.16:36766] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjB3tCmCSWTlPouqoqSbAAAANA"]
[Mon Mar 16 23:52:23.129819 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:44.129825 2026] [proxy_fcgi:error] [pid 11469:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:06.126655 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36400] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:23.173038 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.244.31:35008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjCI-82sZHvlq4xgHqLrgAAApU"]
[Mon Mar 16 23:53:27.033938 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:33.853916 2026] [access_compat:error] [pid 2325:tid 140411616036608] [client 38.127.61.169:28674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Mon Mar 16 23:53:48.046120 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36674] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:09.129828 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:31.121765 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:52.129858 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:13.139449 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37308] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:35.125806 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:56.137916 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:56:17.129797 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:56:38.126975 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38084] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:00.129904 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38186] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:16.629549 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.228.16:54886] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjDDKBJNF7axNlVR0XGyAAAABI"]
[Mon Mar 16 23:57:21.049834 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:45.125786 2026] [proxy_fcgi:error] [pid 4740:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:06.069856 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38714] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:29.133846 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:50.118883 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:11.042124 2026] [proxy_fcgi:error] [pid 2304:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39280] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:32.126656 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:53.129789 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:14.127252 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:36.333788 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:58.135363 2026] [proxy_fcgi:error] [pid 2305:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:01:19.099003 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:01:40.109817 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:01.082063 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:22.557832 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:37.284397 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.228.16:41312] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjETZDEJR9VXonE_-0TVAAAARU"]
[Tue Mar 17 00:02:44.122021 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:06.129839 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:27.057806 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:51.033805 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:12.126185 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41250] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:33.115828 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:52.927532 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.244.31:37100] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjE1O82sZHvlq4xgHqMRwAAAog"]
[Tue Mar 17 00:04:54.122239 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:16.237880 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:38.145834 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:59.132015 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:06:21.241844 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:06:43.145803 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:04.041852 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:25.125814 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:38.067228 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.228.16:34156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjFegQohV2v-7oj5HHIWAAAAZg"]
[Tue Mar 17 00:07:47.123912 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:08.129816 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:29.046214 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43352] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:51.133858 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:13.133808 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:35.135315 2026] [proxy_fcgi:error] [pid 2305:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:56.129772 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:10:12.602101 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.244.31:36070] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjGFJDEJR9VXonE_-0UGQAAARE"]
[Tue Mar 17 00:10:17.045799 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:10:39.131652 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:00.045853 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:21.113804 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:42.129925 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:12:05.130096 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:12:46.045816 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:05.627334 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.228.16:39790] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjGwZDEJR9VXonE_-0UVwAAAQY"]
[Tue Mar 17 00:13:07.033855 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:28.045944 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:49.117824 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:10.115386 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:32.081850 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:53.138153 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:14.125816 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:18.075240 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.244.31:48036] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjHRqBJNF7axNlVR0XIKwAAABE"]
[Tue Mar 17 00:15:35.129801 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:56.129882 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:16:17.125826 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:16:40.526804 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:02.048731 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:23.137815 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:44.133805 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:11.121794 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:11.878110 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.228.16:38892] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjH8-82sZHvlq4xgHqNEgAAAoY"]
[Tue Mar 17 00:18:32.074360 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:53.125779 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:14.125943 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:17.428157 2026] [access_compat:error] [pid 11469:tid 140411733534464] [client 38.127.61.169:59396] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:36.133817 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:37.150454 2026] [access_compat:error] [pid 11469:tid 140411565680384] [client 38.127.61.169:37366] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:53.394459 2026] [access_compat:error] [pid 11469:tid 140411641214720] [client 38.127.61.169:20276] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:57.129858 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:20:19.049847 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:20:35.700611 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.244.31:56724] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjIg9CmCSWTlPouqoqUkAAAANY"]
[Tue Mar 17 00:20:40.137784 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:03.658918 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:25.069852 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:47.106265 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:09.122508 2026] [proxy_fcgi:error] [pid 2304:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:30.125796 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:43.018398 2026] [access_compat:error] [pid 2305:tid 140411674785536] [client 38.127.61.169:20126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:22:51.034078 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:13.129813 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:34.070026 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:37.253609 2026] [:error] [pid 4740:tid 140411548894976] [client 74.7.228.16:58108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjJOQfYLcKp6Sb5AeICnAAAAFc"]
[Tue Mar 17 00:23:55.149774 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:16.133978 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:38.125839 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:59.129813 2026] [proxy_fcgi:error] [pid 11293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:25:20.141809 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:25:39.894957 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.244.31:34810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjJs5DEJR9VXonE_-0VVAAAARc"]
[Tue Mar 17 00:25:41.065851 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:02.099715 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:23.069811 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:46.130572 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55072] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:09.142343 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:30.147274 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:51.131457 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:12.129796 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:34.129873 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:55.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:29:16.129814 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:29:38.117880 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:02.158630 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:23.123846 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:44.145853 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:04.655108 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:39112] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjK-JDEJR9VXonE_-0WGAAAAQs"]
[Tue Mar 17 00:31:05.121853 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:26.130576 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:48.061843 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:09.327790 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:31.034500 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58154] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:52.126350 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:14.121861 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:35.103230 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:56.133809 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:34:18.133823 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:34:39.113239 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:00.133826 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:24.129783 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:45.135068 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:06.122065 2026] [proxy_fcgi:error] [pid 11469:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:28.129775 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:49.115252 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:10.124825 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:32.129790 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:54.126629 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:15.130474 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:36.129836 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:58.129811 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:39:10.154195 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.228.16:41362] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjM3gQohV2v-7oj5HHK1AAAAYc"]
[Tue Mar 17 00:39:20.033825 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:39:41.125770 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:02.147248 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:23.129867 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:45.130235 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:07.117807 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:28.133849 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:37.193531 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.244.31:41046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjNcaBJNF7axNlVR0XKRAAAABA"]
[Tue Mar 17 00:41:49.075116 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:10.125822 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:31.125873 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:53.058927 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:16.129786 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:37.099066 2026] [proxy_fcgi:error] [pid 11469:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:58.070034 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:44:19.126957 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:44:19.457334 2026] [:error] [pid 2304:tid 140411691570944] [client 74.7.228.16:45800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjOE8h3JZxwdBQwPYHBsQAAAIY"]
[Tue Mar 17 00:44:41.125787 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:02.384267 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:24.122555 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:45.139794 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:07.081815 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:28.037884 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:45.803130 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.244.31:58284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjOpe82sZHvlq4xgHqO5QAAAoE"]
[Tue Mar 17 00:46:49.145804 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:11.127560 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:32.129784 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:53.129812 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:14.145855 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:35.129932 2026] [proxy_fcgi:error] [pid 2325:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:56.121918 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:49:17.134453 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:49:36.830450 2026] [:error] [pid 2304:tid 140411725141760] [client 74.7.228.16:38712] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjPUMh3JZxwdBQwPYHCGgAAAII"]
[Tue Mar 17 00:49:38.125803 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:00.137864 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:21.133848 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:43.097837 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:09.108134 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:31.058248 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:52.149813 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:13.109971 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:14.627138 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.244.31:39234] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjP7sh3JZxwdBQwPYHCRAAAAIc"]
[Tue Mar 17 00:52:34.044474 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:55.133776 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:16.186149 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:37.146572 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:58.117649 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:19.130572 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:40.133828 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42110] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:58.909379 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.228.16:48978] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjQktCmCSWTlPouqoqYEgAAAMw"]
[Tue Mar 17 00:55:01.118000 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:55:22.126929 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:55:43.129927 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:04.129781 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:31.103429 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:52.129789 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:13.129888 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:17.869034 2026] [:error] [pid 4740:tid 140411607643904] [client 74.7.244.31:40880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjRHQfYLcKp6Sb5AeIGMwAAAFA"]
[Tue Mar 17 00:57:34.134540 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:55.131583 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43762] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:16.069828 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:37.125835 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44120] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:58.129797 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:59:19.149945 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:59:40.057833 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44700] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:01.070047 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:10.128252 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.228.16:60484] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjRyu82sZHvlq4xgHqQNAAAAok"]
[Tue Mar 17 01:00:22.130265 2026] [proxy_fcgi:error] [pid 2304:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:43.133791 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:04.133822 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45394] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:25.129796 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:53.133800 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:06.703521 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] [client 162.241.120.138:53726] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:02:14.128354 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:36.137851 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:57.129819 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:03:18.124915 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:03:40.129856 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:01.122658 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:22.125771 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:43.150409 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:04.549397 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47558] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:26.125795 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:30.756571 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.228.16:35638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjTCpDEJR9VXonE_-0YuQAAAQ0"]
[Tue Mar 17 01:05:47.126614 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:08.121195 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:30.126411 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:51.125851 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48270] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:57.223838 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] [client 138.68.109.37:48614] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:07:15.123920 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:07:36.141869 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:07:54.754120 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.244.31:33564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjTmpDEJR9VXonE_-0Y3AAAAQ8"]
[Tue Mar 17 01:07:57.141940 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:08:19.129811 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:08:40.134677 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:02.046481 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:23.141833 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:44.150220 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:05.129905 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:26.074391 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:41.824982 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.228.16:38120] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjUQZDEJR9VXonE_-0ZAgAAARM"]
[Tue Mar 17 01:10:47.125802 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:08.133838 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:29.085467 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51238] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:51.181500 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51504] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:12.129784 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:34.129811 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51780] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:57.077867 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:13:15.255204 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.244.31:48668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjU26BJNF7axNlVR0XM-QAAAA8"]
[Tue Mar 17 01:13:18.125052 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:13:41.070195 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:03.123575 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:24.056191 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:46.137793 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:07.074489 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:28.142217 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:50.129826 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:05.371947 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.228.16:36852] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjVhQQohV2v-7oj5HHNDAAAAYg"]
[Tue Mar 17 01:16:11.119625 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:32.123240 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:53.133844 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:14.133807 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:36.049154 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:57.121891 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:18:18.125815 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:18:39.045869 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:00.092259 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:24.134421 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.244.31:38102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjWTO82sZHvlq4xgHqSPAAAAos"]
[Tue Mar 17 01:19:25.127929 2026] [proxy_fcgi:error] [pid 11469:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55648] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:46.034106 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:07.133842 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:28.128042 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:49.057817 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:10.205085 2026] [:error] [pid 2304:tid 140411741927168] [client 74.7.228.16:35136] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjWtsh3JZxwdBQwPYHEZAAAAIA"]
[Tue Mar 17 01:21:11.123911 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:33.080636 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:54.129776 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:15.065851 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:36.285837 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:58.269830 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:23:20.128353 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:23:41.138980 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:02.149828 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:23.113827 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:33.974548 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.244.31:54972] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjXgQfYLcKp6Sb5AeIIXwAAAFE"]
[Tue Mar 17 01:24:47.118909 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:08.137820 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:30.133822 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:51.057810 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:13.125843 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:32.205400 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.228.16:57684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjX-AfYLcKp6Sb5AeIIdQAAAEM"]
[Tue Mar 17 01:26:34.126537 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:55.129794 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:27:16.125795 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:27:38.137824 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:00.130211 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:21.127857 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:42.133866 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:03.123469 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:24.094985 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:45.126478 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:01.074097 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.244.31:38922] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjYyQfYLcKp6Sb5AeIIsgAAAEM"]
[Tue Mar 17 01:30:08.125495 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:29.128133 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:50.142487 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:12.133795 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:35.126476 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:56.093824 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:17.125829 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:38.133782 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:59.037802 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:33:22.138016 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:33:43.129811 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:04.125791 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:26.327430 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:48.125864 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:04.105364 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.244.31:59714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjZ-O82sZHvlq4xgHqT7gAAAoo"]
[Tue Mar 17 01:35:09.125775 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:31.126107 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:52.129800 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:13.121797 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:35.129794 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:56.137777 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:37:17.141785 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:37:39.115696 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:00.137814 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:21.133878 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:44.149791 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:05.132524 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:26.137816 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:47.073944 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:10.125808 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:31.033861 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:52.132641 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:13.117841 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:34.137811 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:56.129838 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:42:17.140669 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:42:21.690547 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.244.31:55528] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjbrQfYLcKp6Sb5AeIJkwAAAEc"]
[Tue Mar 17 01:42:39.049912 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:00.116197 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:11.172437 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.228.16:50816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjb36BJNF7axNlVR0XPawAAAAQ"]
[Tue Mar 17 01:43:22.061794 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:43.129887 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:05.130652 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:26.118607 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:47.122791 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:08.134045 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:31.129932 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:52.125787 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:13.102087 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:34.125854 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:56.114558 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:17.115317 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:29.255062 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:46340] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjc4ZDEJR9VXonE_-0b_wAAAQs"]
[Tue Mar 17 01:47:38.058426 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41622] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:46.438228 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:45978] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjc8pDEJR9VXonE_-0cBQAAAQ4"]
[Tue Mar 17 01:48:00.121792 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41838] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:48:21.133795 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:48:40.171374 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] [client 62.151.179.222:49450] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Tue Mar 17 01:48:43.126404 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:05.132587 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:27.118618 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:48.069818 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:09.133811 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:30.129779 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:51.613801 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:13.057858 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:34.061873 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:55.129337 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:16.125972 2026] [proxy_fcgi:error] [pid 11469:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44156] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:38.042085 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:55.459558 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.244.31:39554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjeJwQohV2v-7oj5HHPCwAAAY4"]
[Tue Mar 17 01:52:59.125826 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:53:21.067209 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:53:29.254618 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.228.16:51782] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjeSaBJNF7axNlVR0XQWQAAABM"]
[Tue Mar 17 01:53:42.126270 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:03.033849 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:26.121873 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:54.126122 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:15.025795 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:37.113876 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:58.115127 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:56:19.121794 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:56:19.468764 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] [client 205.185.123.125:43564] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:56:40.128938 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:01.121899 2026] [proxy_fcgi:error] [pid 11469:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:22.129950 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46652] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:43.153844 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:59.937410 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.244.31:43396] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjfV9CmCSWTlPouqoqeeQAAANg"]
[Tue Mar 17 01:58:04.045908 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:25.096151 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:46.125896 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:47.555304 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.228.16:39276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjfhwQohV2v-7oj5HHPcQAAAYw"]
[Tue Mar 17 01:59:07.126388 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:59:28.137147 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:59:49.137791 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:16.130508 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:37.098447 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:58.023589 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:01:20.129788 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:01:41.087985 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:03.113831 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:24.121824 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:45.130216 2026] [proxy_fcgi:error] [pid 2325:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:06.123641 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:27.125913 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:48.149008 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:52.646344 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.228.16:43614] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjguO82sZHvlq4xgHqWSQAAApg"]
[Tue Mar 17 02:04:09.061987 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50542] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:04:30.129797 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:04:51.137821 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:13.154141 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:37.157845 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:59.141819 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:06:20.142570 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:06:42.135167 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:04.137855 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:25.102860 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:46.133803 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:07.125840 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:28.130558 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:40.387365 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.244.31:53026] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjh2NCmCSWTlPouqoqfWQAAAMY"]
[Tue Mar 17 02:08:49.106801 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:10.045874 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:18.307259 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.228.16:45164] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjh_pDEJR9VXonE_-0d1gAAAQA"]
[Tue Mar 17 02:09:33.129790 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:54.174906 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54006] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:10:15.088819 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:10:36.115085 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:01.133826 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:23.129937 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:44.137801 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:05.061844 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:26.133989 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:47.138679 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:08.133807 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:29.986693 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:51.157868 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:58.318402 2026] [:error] [pid 4740:tid 140411548894976] [client 74.7.244.31:41540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjjFgfYLcKp6Sb5AeIMJAAAAFc"]
[Tue Mar 17 02:14:12.129871 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:14:34.133799 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:14:55.118772 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:16.154547 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56238] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:37.118171 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:39.232468 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.228.16:36092] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjje9CmCSWTlPouqoqf1AAAAMw"]
[Tue Mar 17 02:15:58.134523 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:16:23.129929 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:16:44.139850 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:05.070571 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:26.125818 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:28.349840 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] [client 80.82.121.21:56190] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Tue Mar 17 02:17:47.125928 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:08.115726 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:30.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:51.133993 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:12.145961 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:33.142578 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:56.045834 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:17.149897 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:38.105848 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:52.290123 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.228.16:33880] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjktO82sZHvlq4xgHqX8QAAApE"]
[Tue Mar 17 02:20:59.140509 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59338] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:21:20.130122 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:21:45.150723 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:07.196832 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:29.146054 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:51.147397 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:13.618950 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:35.038307 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:56.150133 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:17.177796 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:20.403575 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.244.31:40464] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjlhJDEJR9VXonE_-0fjwAAAQk"]
[Tue Mar 17 02:24:38.133893 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:59.125101 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:25:20.150879 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:25:41.149783 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:02.140875 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:17.021511 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.228.16:45908] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjl-QfYLcKp6Sb5AeINWgAAAFg"]
[Tue Mar 17 02:26:23.067189 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:44.137828 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:07.103378 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34594] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:28.155881 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:51.095755 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:12.159193 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:34.129828 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:55.189859 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:29:17.152344 2026] [proxy_fcgi:error] [pid 2325:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:29:27.515485 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.244.31:38130] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjmt5DEJR9VXonE_-0f3gAAARE"]
[Tue Mar 17 02:29:39.129820 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:00.150718 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36128] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:21.169813 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:42.146660 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:03.145781 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:23.598343 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.228.16:51826] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjnK-82sZHvlq4xgHqYowAAApM"]
[Tue Mar 17 02:31:24.113832 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:46.146494 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:07.133881 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:29.149102 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:50.153823 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:11.137885 2026] [proxy_fcgi:error] [pid 2305:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:32.165888 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:54.141996 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:16.141782 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:38.117944 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:57.229431 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.244.31:55240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjoAQfYLcKp6Sb5AeIOXQAAAEM"]
[Tue Mar 17 02:34:59.089175 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39272] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:35:20.141839 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:35:42.132822 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:04.125794 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:25.033898 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:46.129045 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:07.113885 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:28.149826 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:50.089973 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:11.116214 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:32.085859 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:53.141936 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:14.163755 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:35.137799 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:56.133115 2026] [proxy_fcgi:error] [pid 4740:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:40:12.971021 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.244.31:58212] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjpPJDEJR9VXonE_-0g9gAAARY"]
[Tue Mar 17 02:40:17.116005 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:40:38.130007 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:00.053568 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:21.109854 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:42.137803 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:03.134206 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:24.137789 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:45.211127 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:07.129825 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:28.061836 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:49.151987 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:10.129805 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:31.157832 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:52.125799 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:13.128499 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:34.133788 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:39.836503 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.244.31:57940] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjqg-82sZHvlq4xgHqZugAAApg"]
[Tue Mar 17 02:45:56.129828 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:17.126208 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:38.143048 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:59.133788 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:47:21.159752 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:47:22.931614 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.228.16:57966] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjq6u82sZHvlq4xgHqZ2QAAAoA"]
[Tue Mar 17 02:47:42.045806 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:03.129814 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:25.453203 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:47.133845 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:08.134521 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:29.060163 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:50.158562 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:11.145806 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:17.054204 2026] [:error] [pid 4740:tid 140411540502272] [client 45.62.98.251:45878] [client 45.62.98.251] ModSecurity: Multipart parsing error: Multipart: Invalid Content-Disposition header (-11): form-data; name=berkas; filename=lock360.php; filename*=utf-8''lock360.php. [hostname "bandeirantesbombas.com.br"] [uri "/.trash7206/index.php"] [unique_id "abjrmAfYLcKp6Sb5AeIPSAAAAFg"]
[Tue Mar 17 02:50:33.129251 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:51.550297 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.244.31:53068] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjruwQohV2v-7oj5HHS8QAAAYk"]
[Tue Mar 17 02:50:54.121827 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:15.130526 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:36.169829 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:57.118918 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:52:18.141852 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:52:29.629901 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.228.16:36616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjsHQQohV2v-7oj5HHTBwAAAZQ"]
[Tue Mar 17 02:52:39.161824 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:00.052183 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:21.821919 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49786] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:43.130595 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:04.048100 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:26.229808 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50334] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:48.050199 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:09.185802 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50684] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:30.157789 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:51.133813 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:12.103371 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.31:46102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjs_KBJNF7axNlVR0XVagAAAAY"]
[Tue Mar 17 02:56:12.106042 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51180] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:33.133791 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:54.134204 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:15.033963 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:36.142427 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:53.411703 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.228.16:35384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjtYZDEJR9VXonE_-0iAgAAAQI"]
[Tue Mar 17 02:57:57.151805 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:58:18.137817 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:58:39.133845 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:01.041669 2026] [proxy_fcgi:error] [pid 11469:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:22.060079 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:44.129957 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:05.134364 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:26.129785 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:47.126327 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:15.057290 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:22.069997 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.244.31:44520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjuMu82sZHvlq4xgHqbXgAAApA"]
[Tue Mar 17 03:01:36.145807 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:58.168911 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:02:19.138318 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:02:40.140013 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:00.135248 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.228.16:59026] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjulAfYLcKp6Sb5AeIQTQAAAFE"]
[Tue Mar 17 03:03:01.139727 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:22.125909 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:44.137722 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55012] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:06.129815 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:27.121791 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:48.121823 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:09.166024 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:31.045868 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:53.074918 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56182] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:14.057850 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:36.133815 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:58.149018 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:07:19.129917 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:07:40.176982 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:02.134497 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:23.029815 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:28.793071 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:35564] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjv3NCmCSWTlPouqoqj4wAAANM"]
[Tue Mar 17 03:08:44.116685 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:06.033814 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:28.121778 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:49.133804 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:10.121804 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:32.137826 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:53.116042 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:11:14.057819 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:11:33.624813 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] [client 179.188.53.243:59330] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.624855 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] (104)Connection reset by peer: [client 179.188.53.243:59330] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.646040 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] [client 179.188.53.243:59728] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.646081 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (104)Connection reset by peer: [client 179.188.53.243:59728] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.665837 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] [client 179.188.53.243:33040] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.665890 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:33040] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668336 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] [client 179.188.53.243:59574] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668367 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (104)Connection reset by peer: [client 179.188.53.243:59574] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668593 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] [client 179.188.53.243:60590] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668617 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (104)Connection reset by peer: [client 179.188.53.243:60590] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668675 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] [client 179.188.53.243:32876] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668696 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (104)Connection reset by peer: [client 179.188.53.243:32876] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668777 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] [client 179.188.53.243:59912] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668818 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:59912] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.669172 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] [client 179.188.53.243:33312] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.669191 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:33312] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.674337 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] [client 179.188.53.243:33624] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.674380 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (104)Connection reset by peer: [client 179.188.53.243:33624] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.690714 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] [client 69.197.179.242:57274] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Tue Mar 17 03:11:33.690768 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (104)Connection reset by peer: [client 69.197.179.242:57274] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Tue Mar 17 03:11:33.700392 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] [client 179.188.53.243:60118] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.700439 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:60118] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.701528 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] [client 179.188.53.243:60380] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.701557 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:60380] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.722473 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] [client 179.188.53.243:60746] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.722515 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:60746] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.731002 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] [client 179.188.53.243:60964] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.731035 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:60964] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.731460 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] [client 179.188.53.243:33514] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.731502 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:33514] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:54.212742 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.244.31:53550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjwqqBJNF7axNlVR0XWvAAAAAc"]
[Tue Mar 17 03:13:32.966944 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.228.16:53740] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjxDO82sZHvlq4xgHqcFAAAAoU"]
[Tue Mar 17 03:18:33.259265 2026] [:error] [pid 4740:tid 140411741927168] [client 74.7.228.16:36576] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjyOQfYLcKp6Sb5AeIRHgAAAEA"]
[Tue Mar 17 03:19:12.774135 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.244.31:54600] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjyYMh3JZxwdBQwPYHNigAAAJI"]
[Tue Mar 17 03:24:11.723239 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.228.16:37526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjziwQohV2v-7oj5HHUzgAAAYE"]
[Tue Mar 17 03:26:55.111814 2026] [:error] [pid 2304:tid 140411599251200] [client 204.12.208.18:59736] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abj0L8h3JZxwdBQwPYHOCgAAAJE"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Tue Mar 17 03:29:42.311963 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.244.31:39178] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj01tCmCSWTlPouqoqlNwAAAMM"]
[Tue Mar 17 03:30:17.554810 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.228.16:58454] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj0-QfYLcKp6Sb5AeIRzgAAAEc"]
[Tue Mar 17 03:34:44.022836 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.244.31:49214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj2BJDEJR9VXonE_-0ldwAAARQ"]
[Tue Mar 17 03:36:09.324235 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.228.16:53606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj2WQfYLcKp6Sb5AeISPgAAAFE"]
[Tue Mar 17 03:40:44.191615 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.244.31:54238] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj3bKBJNF7axNlVR0XYZwAAAAg"]
[Tue Mar 17 03:45:49.715650 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:55902] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj4nch3JZxwdBQwPYHPDwAAAJE"]
[Tue Mar 17 03:48:15.198475 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.228.16:40052] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj5L-82sZHvlq4xgHqeLwAAAoQ"]
[Tue Mar 17 03:51:14.741582 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.244.31:44338] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj54gfYLcKp6Sb5AeITPAAAAEU"]
[Tue Mar 17 03:53:54.038848 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.228.16:59406] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj6gqBJNF7axNlVR0XZAQAAAAo"]
[Tue Mar 17 03:56:21.000156 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.244.31:48710] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj7FNCmCSWTlPouqoqmvgAAANI"]
[Tue Mar 17 03:59:03.618882 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.228.16:42862] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj7twQohV2v-7oj5HHWzgAAAYM"]
[Tue Mar 17 04:01:26.284755 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.244.31:49634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj8Rsh3JZxwdBQwPYHQGQAAAJc"]
[Tue Mar 17 04:05:03.806356 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.228.16:41580] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj9H9CmCSWTlPouqoqnPgAAAMM"]
[Tue Mar 17 04:06:27.374814 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:58544] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj9c5DEJR9VXonE_-0nSgAAAQs"]
[Tue Mar 17 04:10:45.867050 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.228.16:39570] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj-ddCmCSWTlPouqoqngQAAANA"]
[Tue Mar 17 04:13:45.434690 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.244.31:50348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj_KZDEJR9VXonE_-0ntwAAAQY"]
[Tue Mar 17 04:15:49.643316 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:44354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj_paBJNF7axNlVR0XaPQAAAAc"]
[Tue Mar 17 04:19:12.600609 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.244.31:60226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkAcO82sZHvlq4xgHqf7AAAApc"]
[Tue Mar 17 04:22:21.039423 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.228.16:48280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkBLZDEJR9VXonE_-0oYQAAAQc"]
[Tue Mar 17 04:28:18.403641 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.228.16:45766] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkCkgQohV2v-7oj5HHYiAAAAZA"]
[Tue Mar 17 04:30:15.965051 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.31:52256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkDB6BJNF7axNlVR0Xa-gAAAAY"]
[Tue Mar 17 04:35:13.154477 2026] [:error] [pid 4740:tid 140411658000128] [client 74.7.228.16:48050] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkEMQfYLcKp6Sb5AeIWIQAAAEo"]
[Tue Mar 17 04:35:18.866052 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.244.31:35908] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkENgfYLcKp6Sb5AeIWLAAAAFE"]
[Tue Mar 17 04:40:30.321562 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.228.16:33070] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkFbQQohV2v-7oj5HHZIAAAAZc"]
[Tue Mar 17 04:46:00.007816 2026] [:error] [pid 2304:tid 140411691570944] [client 74.7.244.31:41174] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkGuMh3JZxwdBQwPYHSvAAAAIY"]
[Tue Mar 17 04:50:58.475483 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.228.16:34624] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkH4u82sZHvlq4xgHqh6QAAAok"]
[Tue Mar 17 04:51:05.943464 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.244.31:33082] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkH6ch3JZxwdBQwPYHTYQAAAJU"]
[Tue Mar 17 04:51:22.631659 2026] [access_compat:error] [pid 2325:tid 140411632822016] [client 45.94.31.197:45016] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 04:56:17.850810 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:50262] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkJIdCmCSWTlPouqoqqogAAANM"]
[Tue Mar 17 04:56:30.611759 2026] [:error] [pid 4740:tid 140411557287680] [client 74.7.244.31:52484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkJLgfYLcKp6Sb5AeIX8wAAAFY"]
[Tue Mar 17 05:01:29.573160 2026] [:error] [pid 4740:tid 140411590858496] [client 74.7.228.16:39890] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkKWQfYLcKp6Sb5AeIYWgAAAFI"]
[Tue Mar 17 05:01:35.776892 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.244.31:35918] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkKXwQohV2v-7oj5HHbJgAAAYA"]
[Tue Mar 17 05:06:52.132785 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.228.16:42382] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkLnMh3JZxwdBQwPYHUqgAAAIw"]
[Tue Mar 17 05:06:53.550105 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.244.31:45612] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkLnch3JZxwdBQwPYHUqwAAAJQ"]
[Tue Mar 17 05:09:14.891046 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.228.16:53890] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkMKgfYLcKp6Sb5AeIY6wAAAEc"]
[Tue Mar 17 05:10:32.299721 2026] [access_compat:error] [pid 4740:tid 140411699963648] [client 73.231.36.91:54536] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:12:02.616863 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.244.31:47894] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkM0tCmCSWTlPouqoqrfgAAAM4"]
[Tue Mar 17 05:13:07.627169 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.228.16:33266] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkNE8h3JZxwdBQwPYHVBQAAAIE"]
[Tue Mar 17 05:17:21.007123 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.244.31:46784] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkOEch3JZxwdBQwPYHVTQAAAIM"]
[Tue Mar 17 05:18:19.835430 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.228.16:59276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkOS9CmCSWTlPouqoqsYQAAAM0"]
[Tue Mar 17 05:22:27.694826 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.244.31:42152] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkPQ-82sZHvlq4xgHqkJgAAApQ"]
[Tue Mar 17 05:23:24.166561 2026] [access_compat:error] [pid 11469:tid 140411616036608] [client 181.192.86.119:24494] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:23:38.314818 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.228.16:49442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkPish3JZxwdBQwPYHWHgAAAJE"]
[Tue Mar 17 05:28:40.838156 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.228.16:33420] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkQuAfYLcKp6Sb5AeIa6wAAAEU"]
[Tue Mar 17 05:32:58.036604 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.244.31:42398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkRutCmCSWTlPouqoqtTAAAAME"]
[Tue Mar 17 05:35:27.872794 2026] [access_compat:error] [pid 2325:tid 140411641214720] [client 45.154.98.78:40684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:38:18.414819 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.244.31:54658] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkS-pDEJR9VXonE_-0uiQAAARc"]
[Tue Mar 17 05:39:06.323428 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.228.16:49458] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkTKgQohV2v-7oj5HHeHgAAAYA"]
[Tue Mar 17 05:43:53.359935 2026] [access_compat:error] [pid 11293:tid 140411733534464] [client 45.94.31.197:46112] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:44:30.838197 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.228.16:57218] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkUbu82sZHvlq4xgHql5QAAApU"]
[Tue Mar 17 05:50:10.999172 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.244.31:37594] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkVwtCmCSWTlPouqoqvCgAAAMU"]
[Tue Mar 17 05:55:11.124979 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.228.16:40292] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkW75DEJR9VXonE_-0xPAAAARQ"]
[Tue Mar 17 05:55:34.867196 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.244.31:56072] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkXBsh3JZxwdBQwPYHaJwAAAJI"]
[Tue Mar 17 06:00:21.075081 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.228.16:53622] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkYJaBJNF7axNlVR0Xl_gAAAAY"]
[Tue Mar 17 06:00:36.441309 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.244.31:51686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkYNO82sZHvlq4xgHqqdgAAAo8"]
[Tue Mar 17 06:05:32.885963 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.228.16:52540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkZXKBJNF7axNlVR0XmdwAAAAM"]
[Tue Mar 17 06:05:53.758540 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.244.31:41530] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkZcZDEJR9VXonE_-011QAAAQc"]
[Tue Mar 17 06:10:40.111432 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.228.16:60024] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkakAQohV2v-7oj5HHldwAAAZU"]
[Tue Mar 17 06:10:58.107906 2026] [:error] [pid 2304:tid 140411658000128] [client 74.7.244.31:41956] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkaosh3JZxwdBQwPYHewQAAAIo"]
[Tue Mar 17 06:16:02.284908 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.228.16:47590] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkb0qBJNF7axNlVR0XoEAAAAAY"]
[Tue Mar 17 06:16:25.541111 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.244.31:48722] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkb6QfYLcKp6Sb5AeIkGgAAAFg"]
[Tue Mar 17 06:21:12.375037 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:49572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkdCKBJNF7axNlVR0Xo6QAAAAc"]
[Tue Mar 17 06:21:33.021984 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.244.31:40726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkdHQQohV2v-7oj5HHnuAAAAY0"]
[Tue Mar 17 06:26:36.947337 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.228.16:45312] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkeTAQohV2v-7oj5HHoaAAAAZY"]
[Tue Mar 17 06:26:53.114860 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.244.31:51226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkeXQQohV2v-7oj5HHocwAAAYM"]
[Tue Mar 17 06:31:43.389368 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.228.16:43662] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkffwfYLcKp6Sb5AeImKgAAAEM"]
[Tue Mar 17 06:37:23.427208 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.244.31:47058] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkg09CmCSWTlPouqoq6DQAAAMw"]
[Tue Mar 17 06:42:13.179073 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.228.16:33150] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkh9ZDEJR9VXonE_-06hwAAARI"]
[Tue Mar 17 06:42:26.014254 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.244.31:51674] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkiAsh3JZxwdBQwPYHiwgAAAJM"]
[Tue Mar 17 06:47:38.162097 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.228.16:46830] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkjOpDEJR9VXonE_-07MgAAAQo"]
[Tue Mar 17 06:53:01.940730 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.244.31:47936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkkfdCmCSWTlPouqoq7ZAAAANg"]
[Tue Mar 17 06:58:08.339183 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.16:59730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abklsKBJNF7axNlVR0XtQQAAABU"]
[Tue Mar 17 06:58:26.475033 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.244.31:34416] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abklwsh3JZxwdBQwPYHkrwAAAJU"]
[Tue Mar 17 07:03:19.459184 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.228.16:34304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkm56BJNF7axNlVR0Xt5AAAABg"]
[Tue Mar 17 07:03:33.643002 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:47456] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkm9ch3JZxwdBQwPYHlnAAAAJE"]
[Tue Mar 17 07:08:46.880753 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.228.16:50178] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkoLnQLOys_ArAUsGMERQAAAc0"]
[Tue Mar 17 07:08:57.295201 2026] [:error] [pid 4740:tid 140411641214720] [client 74.7.244.31:56054] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkoOQfYLcKp6Sb5AeIqMAAAAEw"]
[Tue Mar 17 07:14:02.962610 2026] [:error] [pid 3788:tid 140411565680384] [client 74.7.244.31:54000] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkpahACmvdph3vou-IDJwAAAVU"]
[Tue Mar 17 07:15:43.950461 2026] [:error] [pid 5398:tid 140411741927168] [client 74.7.228.16:43202] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkpzwRES9pL8P-grjlaaAAAAgA"]
[Tue Mar 17 07:19:25.536770 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.244.31:57776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkqre82sZHvlq4xgHq0rgAAAoI"]
[Tue Mar 17 07:21:21.557258 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.228.16:33834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkrIe82sZHvlq4xgHq04wAAAo8"]
[Tue Mar 17 07:24:31.823058 2026] [:error] [pid 6002:tid 140411599251200] [client 74.7.244.31:43614] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkr3_AKZeKGvQeoFhk_OAAAAtE"]
[Tue Mar 17 07:26:21.778582 2026] [:error] [pid 5398:tid 140411716749056] [client 74.7.228.16:35732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abksTQRES9pL8P-grjla6AAAAgM"]
[Tue Mar 17 07:29:57.374819 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.244.31:40466] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abktJQQohV2v-7oj5HHt1QAAAZE"]
[Tue Mar 17 07:31:43.870506 2026] [:error] [pid 6002:tid 140411683178240] [client 74.7.228.16:39776] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abktj_AKZeKGvQeoFhk_ZwAAAsc"]
[Tue Mar 17 07:36:50.051377 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.228.16:36540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkuwgeiSKl8TjouI-b25QAAA8I"]
[Tue Mar 17 07:40:27.782882 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.244.31:56706] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkvmweiSKl8TjouI-b3IAAAA8A"]
[Tue Mar 17 07:46:46.094928 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.244.31:37004] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkxFgQohV2v-7oj5HHu7AAAAZU"]
[Tue Mar 17 07:47:11.946788 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.228.16:40732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkxL9CmCSWTlPouqoq_sgAAAMc"]
[Tue Mar 17 07:52:37.542605 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.16:56610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkydaBJNF7axNlVR0XyFAAAABU"]
[Tue Mar 17 07:57:29.384666 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.244.31:53608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkzme82sZHvlq4xgHq3kwAAAo8"]
[Tue Mar 17 08:02:32.733211 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:55026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk0yKBJNF7axNlVR0XyvgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:02:34.074762 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.244.31:58452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk0yu82sZHvlq4xgHq4JAAAApE"]
[Tue Mar 17 08:02:55.984029 2026] [:error] [pid 4712:tid 140411599251200] [client 74.7.228.16:60278] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk033QLOys_ArAUsGMHbwAAAdE"]
[Tue Mar 17 08:03:58.274918 2026] [:error] [pid 6002:tid 140411666392832] [client 74.7.241.46:56896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1HvAKZeKGvQeoFhlBRwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:04:26.319190 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:52386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1OgeiSKl8TjouI-b4zAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:05:18.811675 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:57032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1bhePVOt35XCGZP8jywAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:07:30.467026 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:58974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk18hePVOt35XCGZP8j-AAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:07:50.907015 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.244.31:53618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk2BqBJNF7axNlVR0XzewAAABE"]
[Tue Mar 17 08:08:12.566984 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.228.16:54344] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk2HAQohV2v-7oj5HHxGAAAAZY"]
[Tue Mar 17 08:08:29.431052 2026] [:error] [pid 4712:tid 140411708356352] [client 74.7.243.203:35446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2LXQLOys_ArAUsGMIGAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:09:08.363095 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2VNCmCSWTlPouqorB1wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:10:03.141086 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:51182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2iwQohV2v-7oj5HHxTAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:12:36.013778 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:38860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3JJDEJR9VXonE_-1EJgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:12:40.574883 2026] [:error] [pid 5398:tid 140411616036608] [client 74.7.243.203:35116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3KARES9pL8P-grjlfRQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:13:01.219649 2026] [:error] [pid 4712:tid 140411590858496] [client 74.7.243.203:46212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3PXQLOys_ArAUsGMIogAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:13:02.917833 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.244.31:48992] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk3Pu82sZHvlq4xgHq5qgAAAo0"]
[Tue Mar 17 08:13:12.841160 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.228.16:35330] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk3SAQohV2v-7oj5HHxpQAAAZA"]
[Tue Mar 17 08:14:49.256071 2026] [:error] [pid 662:tid 140411691570944] [client 74.7.241.46:58168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3qa60egQjobaJUYgG4gAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:15:17.049434 2026] [access_compat:error] [pid 6002:tid 140411590858496] [client 45.141.128.193:38611] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:18.286389 2026] [access_compat:error] [pid 11469:tid 140411733534464] [client 45.141.128.193:61583] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:20.072112 2026] [access_compat:error] [pid 6002:tid 140411607643904] [client 45.141.128.193:13187] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:35.398100 2026] [access_compat:error] [pid 662:tid 140411616036608] [client 172.83.254.207:28455] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:57.343265 2026] [access_compat:error] [pid 662:tid 140411674785536] [client 185.77.220.68:53769] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:59.484977 2026] [access_compat:error] [pid 2473:tid 140411708356352] [client 185.77.220.68:58745] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:16:01.623512 2026] [access_compat:error] [pid 1210:tid 140411658000128] [client 185.77.220.68:11793] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:16:23.460128 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:58176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4B5DEJR9VXonE_-1EvAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:26.148496 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.241.46:49994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4CHRXaaWotPICgYsbsQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:16:28.505121 2026] [:error] [pid 6002:tid 140411699963648] [client 74.7.241.46:49998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4C_AKZeKGvQeoFhlCjgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:30.091928 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4DgeiSKl8TjouI-b6EAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:31.483528 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:60920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4D5DEJR9VXonE_-1EwAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:33.916655 2026] [:error] [pid 32588:tid 140411574073088] [client 74.7.241.46:60924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ES8PwvOE6ZaeZxiFyQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:35.351234 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4E3QLOys_ArAUsGMI-wAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:37.264938 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:60942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4FJqmL8PQht4WJFlALQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:38.609394 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:59902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4FtCmCSWTlPouqorCywAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:39.927013 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:59916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4F9CmCSWTlPouqorC0AAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:41.488326 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:59922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4GQQohV2v-7oj5HHyDQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:42.910939 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.241.46:59926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4GpDEJR9VXonE_-1ExAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:44.727276 2026] [:error] [pid 1517:tid 140411741927168] [client 74.7.241.46:59936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HGHuKRvkhJseepPaZQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:46.125055 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:59942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HhePVOt35XCGZP8lSQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:47.475292 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:59946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HweiSKl8TjouI-b6GQAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:48.931469 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.241.46:38624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4IHRXaaWotPICgYsbvgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:50.237998 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.241.46:38628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4IhePVOt35XCGZP8lTQAAA4E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:51.490315 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:38636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4I5qmL8PQht4WJFlAOQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:54.212310 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:38642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4JNCmCSWTlPouqorC2gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:55.701600 2026] [:error] [pid 662:tid 140411632822016] [client 74.7.241.46:38644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4J660egQjobaJUYgHJwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:58.246646 2026] [:error] [pid 6002:tid 140411624429312] [client 74.7.241.46:38654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4KvAKZeKGvQeoFhlCnQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:59.575064 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:41294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4K3RXaaWotPICgYsbwQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:00.885376 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:41298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LKBJNF7axNlVR0X0dgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:02.370710 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:41300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LgRES9pL8P-grjlfuwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:03.895484 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:41302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LwRES9pL8P-grjlfvAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:05.191201 2026] [:error] [pid 32588:tid 140411674785536] [client 74.7.241.46:41304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4MS8PwvOE6ZaeZxiFzwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:06.559988 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:41316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Mu82sZHvlq4xgHq6ogAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:07.912158 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:41328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4M9CmCSWTlPouqorC4QAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:09.236232 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:45384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4NdCmCSWTlPouqorC4gAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:10.524759 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.241.46:45400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4NpqmL8PQht4WJFlAQwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:11.859268 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4N9CmCSWTlPouqorC5AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:13.231105 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:45418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Oe82sZHvlq4xgHq6qgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:14.543464 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4OtCmCSWTlPouqorC5gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:15.877257 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4O9CmCSWTlPouqorC5wAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:17.189583 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4PdCmCSWTlPouqorC6AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:18.523793 2026] [:error] [pid 1517:tid 140411548894976] [client 74.7.241.46:45952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4PmHuKRvkhJseepPadQAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:19.947528 2026] [:error] [pid 6002:tid 140411691570944] [client 74.7.241.46:45966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4P_AKZeKGvQeoFhlCqQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:21.303085 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:45980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4QXRXaaWotPICgYsb1gAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:22.590971 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.241.46:45982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4QhePVOt35XCGZP8lWwAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:24.205638 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:45996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4RJqmL8PQht4WJFlASgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:25.608461 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:46010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4RQQohV2v-7oj5HHyGgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:26.910958 2026] [:error] [pid 32588:tid 140411674785536] [client 74.7.241.46:46018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Ri8PwvOE6ZaeZxiF0gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:28.243526 2026] [:error] [pid 6002:tid 140411582465792] [client 74.7.241.46:44344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4SPAKZeKGvQeoFhlCqwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:29.631380 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:44360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4SZqmL8PQht4WJFlATAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:30.965189 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:44374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ShePVOt35XCGZP8lXwAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:32.283026 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:44376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TBePVOt35XCGZP8lYQAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:33.635023 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:44382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TQQohV2v-7oj5HHyHgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:34.797161 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:44390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TtCmCSWTlPouqorC7AAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:36.174999 2026] [:error] [pid 6002:tid 140411632822016] [client 74.7.241.46:44392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4UPAKZeKGvQeoFhlCrwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:38.359039 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:44408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Ue82sZHvlq4xgHq6yQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:39.725273 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:37656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Uy8PwvOE6ZaeZxiF1AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:41.075422 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:37658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4VQQohV2v-7oj5HHyIwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:42.603530 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:37666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Vi8PwvOE6ZaeZxiF1QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:44.145221 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:37682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4WAQohV2v-7oj5HHyJQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:45.705323 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:37692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4WQQohV2v-7oj5HHyJwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:47.157180 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:37706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4W9CmCSWTlPouqorC9wAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:48.482741 2026] [:error] [pid 1517:tid 140411716749056] [client 74.7.241.46:41392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XGHuKRvkhJseepPafwAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:49.830905 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:41406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XQQohV2v-7oj5HHyKgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:51.206763 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:41414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XweiSKl8TjouI-b6MwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:52.447366 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:41426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YKBJNF7axNlVR0X0iQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:53.743611 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:41442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YS8PwvOE6ZaeZxiF2AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:55.061579 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:41454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YwQohV2v-7oj5HHyLAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:56.463238 2026] [:error] [pid 1517:tid 140411565680384] [client 74.7.241.46:41468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ZGHuKRvkhJseepPagwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:58.939954 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:41470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Zi8PwvOE6ZaeZxiF3AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:18:03.876301 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.244.31:51510] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk4awQohV2v-7oj5HHyLwAAAYo"]
[Tue Mar 17 08:18:06.898952 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:47990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4btCmCSWTlPouqorDDgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:18:09.334841 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:49478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4cdCmCSWTlPouqorDEwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:18:14.539492 2026] [:error] [pid 5398:tid 140411590858496] [client 74.7.228.16:52276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk4dgRES9pL8P-grjlfxwAAAhI"]
[Tue Mar 17 08:18:36.739253 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:49484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4jAQohV2v-7oj5HHyTQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:18:56.678349 2026] [:error] [pid 1517:tid 140411624429312] [client 74.7.241.46:51746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4oGHuKRvkhJseepPamAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:00.443205 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4pO82sZHvlq4xgHq68QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:08.172445 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:45998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4rKBJNF7axNlVR0X0oAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:15.135071 2026] [:error] [pid 662:tid 140411616036608] [client 74.7.241.46:59582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4s660egQjobaJUYgHZgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:20.967675 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:59596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4uKBJNF7axNlVR0X0pwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:19:41.603367 2026] [:error] [pid 6002:tid 140411641214720] [client 74.7.241.46:45086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4zfAKZeKGvQeoFhlC5gAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:43.258825 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:34058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4z6BJNF7axNlVR0X0sQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:44.789551 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:34070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk40FKJy4A1bGlmj9BNgAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:46.163625 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk40u82sZHvlq4xgHq7AQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:47.533487 2026] [:error] [pid 1961:tid 140411548894976] [client 74.7.241.46:34094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk403RXaaWotPICgYscAgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:48.851586 2026] [:error] [pid 1517:tid 140411624429312] [client 74.7.241.46:59894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk41GHuKRvkhJseepParAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:51.307098 2026] [:error] [pid 32588:tid 140411574073088] [client 74.7.241.46:59906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk41y8PwvOE6ZaeZxiGCQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:58.703578 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:59916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk43pDEJR9VXonE_-1FGwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:00.207402 2026] [:error] [pid 5398:tid 140411733534464] [client 74.7.241.46:41416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk44ARES9pL8P-grjlf6wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:07.055693 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:41418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk451KJy4A1bGlmj9BNhgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:09.843615 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:44044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk46XRXaaWotPICgYscCwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:12.499458 2026] [:error] [pid 4712:tid 140411565680384] [client 74.7.241.46:44058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk47HQLOys_ArAUsGMJOAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:14.071310 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:44072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk47nRXaaWotPICgYscEAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:15.697296 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:44076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk473RXaaWotPICgYscEwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:17.265682 2026] [:error] [pid 662:tid 140411557287680] [client 74.7.241.46:44092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk48a60egQjobaJUYgHewAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:18.574368 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:33718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk48lKJy4A1bGlmj9BNhwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:20.195013 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:33728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk49JqmL8PQht4WJFlAnQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:23.473140 2026] [:error] [pid 6002:tid 140411741927168] [client 74.7.241.46:33734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk49_AKZeKGvQeoFhlC8QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:26.370945 2026] [:error] [pid 5398:tid 140411574073088] [client 74.7.241.46:33748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4-gRES9pL8P-grjlf9AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:29.199864 2026] [:error] [pid 662:tid 140411548894976] [client 74.7.241.46:33762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4_a60egQjobaJUYgHhQAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:31.937332 2026] [:error] [pid 5398:tid 140411691570944] [client 74.7.241.46:38852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4_wRES9pL8P-grjlf9gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:35.390849 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:38864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5AhePVOt35XCGZP8lnAAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:36.878967 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:38880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5BJDEJR9VXonE_-1FLAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:39.431584 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5B5DEJR9VXonE_-1FMAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:42.783727 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:34836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5CnRXaaWotPICgYscHwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:45.540722 2026] [:error] [pid 662:tid 140411674785536] [client 74.7.241.46:34838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5DK60egQjobaJUYgHiQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:47.968772 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:34840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5DgeiSKl8TjouI-b6cQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:49.339435 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5EVKJy4A1bGlmj9BNkQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:50.763351 2026] [:error] [pid 4712:tid 140411607643904] [client 74.7.241.46:49274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5EnQLOys_ArAUsGMJSgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:52.403162 2026] [:error] [pid 662:tid 140411649607424] [client 74.7.241.46:49278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5FK60egQjobaJUYgHjAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:53.847303 2026] [:error] [pid 5398:tid 140411691570944] [client 74.7.241.46:49286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5FQRES9pL8P-grjlgAAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:55.091431 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:49288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5F9CmCSWTlPouqorDYAAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:56.521141 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:49300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5GKBJNF7axNlVR0X0xgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:58.931206 2026] [:error] [pid 32588:tid 140411624429312] [client 74.7.241.46:49304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Gi8PwvOE6ZaeZxiGQAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:00.340852 2026] [:error] [pid 5398:tid 140411649607424] [client 74.7.241.46:33336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HARES9pL8P-grjlgAwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:01.703642 2026] [:error] [pid 5398:tid 140411641214720] [client 74.7.241.46:33348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HQRES9pL8P-grjlgBAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:03.183357 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:33350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HxePVOt35XCGZP8lpAAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:04.635157 2026] [:error] [pid 662:tid 140411616036608] [client 74.7.241.46:33360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5IK60egQjobaJUYgHjQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:06.147362 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.241.46:33362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5IgQohV2v-7oj5HHykQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:07.666535 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.241.46:33366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5I1KJy4A1bGlmj9BNkwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:08.814621 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:55048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5JO82sZHvlq4xgHq7SQAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 08:21:10.294123 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5JlKJy4A1bGlmj9BNlQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:17.319825 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:43196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5KwQohV2v-7oj5HHymgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:19.952708 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:55912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5L5qmL8PQht4WJFlApgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:21.407401 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:55918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5MRePVOt35XCGZP8lpwAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:23.856503 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.241.46:55932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5MhePVOt35XCGZP8lqAAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:29.457782 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:55946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Oe82sZHvlq4xgHq7UAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:30.959502 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:49242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5OtCmCSWTlPouqorDcAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:33.599129 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5PXRXaaWotPICgYscOQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:36.984937 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5QBePVOt35XCGZP8lsQAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:38.312753 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:34330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5QpqmL8PQht4WJFlAqgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:39.568508 2026] [:error] [pid 6002:tid 140411725141760] [client 74.7.241.46:34340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Q_AKZeKGvQeoFhlC_gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:40.879291 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:34354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5RJDEJR9VXonE_-1FTAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:42.235718 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:34368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5RpqmL8PQht4WJFlAqwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:44.568802 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.46:34382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5SAeiSKl8TjouI-b6ewAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:45.866576 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.241.46:34386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5SXRXaaWotPICgYscPgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:48.120132 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:34396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5TO82sZHvlq4xgHq7VgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:49.459526 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:38572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5TaBJNF7axNlVR0X02wAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:50.783171 2026] [:error] [pid 5398:tid 140411641214720] [client 74.7.241.46:38584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5TgRES9pL8P-grjlgKgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:52.006397 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:38594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5UKBJNF7axNlVR0X03AAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:54.531933 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:38604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5UnRXaaWotPICgYscQgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:57.689249 2026] [:error] [pid 662:tid 140411641214720] [client 74.7.241.46:38606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Va60egQjobaJUYgHrgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:01.550476 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:43962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5WQQohV2v-7oj5HHypwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:04.051397 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:43964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5XHRXaaWotPICgYscSgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:22.435162 2026] [:error] [pid 5398:tid 140411708356352] [client 74.7.243.203:52680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5bgRES9pL8P-grjlgXgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:22:24.824999 2026] [:error] [pid 662:tid 140411658000128] [client 74.7.243.203:54670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5cK60egQjobaJUYgHtQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:22:26.183719 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:54680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5cgeiSKl8TjouI-b6fwAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:22:27.707643 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:54690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5cxePVOt35XCGZP8lvQAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:22:40.262741 2026] [:error] [pid 5398:tid 140411590858496] [client 74.7.241.46:43976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5gARES9pL8P-grjlgbwAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:42.671913 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:47360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5gu82sZHvlq4xgHq7YAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:23:04.121926 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.244.31:48690] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk5mJqmL8PQht4WJFlAtQAAAVI"]
[Tue Mar 17 08:23:17.083022 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.228.16:36124] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk5pQeiSKl8TjouI-b6hwAAA8A"]
[Tue Mar 17 08:23:25.064793 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:47362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5rVKJy4A1bGlmj9BN0gAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:23:29.579586 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.241.46:50258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5sRePVOt35XCGZP8l0QAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:23:46.676089 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:36886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5wpDEJR9VXonE_-1F0gAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:23:49.264646 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:36886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5xZDEJR9VXonE_-1F2wAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:23:50.663001 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:50242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5xu82sZHvlq4xgHq7bwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:24:13.527488 2026] [:error] [pid 32588:tid 140411557287680] [client 74.7.241.46:50258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk53S8PwvOE6ZaeZxiGowAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:24:16.114487 2026] [:error] [pid 662:tid 140411548894976] [client 74.7.241.46:44390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk54K60egQjobaJUYgHxgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:24:22.086325 2026] [:error] [pid 5398:tid 140411666392832] [client 74.7.241.46:44392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk55gRES9pL8P-grjlgiAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:24:55.739799 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:44166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6B6BJNF7axNlVR0X1PgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:25:14.596577 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:54818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6GhePVOt35XCGZP8mXgAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:00.110478 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.241.46:55112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6SHQLOys_ArAUsGMJrQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:04.959462 2026] [:error] [pid 662:tid 140411683178240] [client 74.7.241.46:50202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6TK60egQjobaJUYgH2gAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:26:08.938606 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:50216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6UAeiSKl8TjouI-b6nAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:15.261945 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:47628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6V5DEJR9VXonE_-1GPgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:20.946760 2026] [:error] [pid 1961:tid 140411658000128] [client 74.7.243.203:45844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6XHRXaaWotPICgYsdXAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:50.324164 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.241.46:58694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6epqmL8PQht4WJFlA9QAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:53.966399 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.46:45906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6fQeiSKl8TjouI-b6oAAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:01.903712 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:45912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6hXRXaaWotPICgYsdegAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:03.679865 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:41004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6h9CmCSWTlPouqorDvgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:04.980209 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:41010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6iAQohV2v-7oj5HHy1AAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:27:11.596107 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6j1KJy4A1bGlmj9BN8wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:27:17.355648 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:37034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6lZDEJR9VXonE_-1GSwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:27:17.730453 2026] [:error] [pid 32588:tid 140411616036608] [client 74.7.243.203:58648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6lS8PwvOE6ZaeZxiG4wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:48.018597 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:52128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6tARES9pL8P-grjlg1gAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:27:52.570690 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.241.46:49440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6uBePVOt35XCGZP8m4QAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:27:59.263891 2026] [:error] [pid 5398:tid 140411565680384] [client 74.7.243.203:35464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6vwRES9pL8P-grjlg4QAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:28:04.271222 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.244.31:34518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk6xNCmCSWTlPouqorDxAAAANc"]
[Tue Mar 17 08:28:18.687332 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.228.16:55540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk60nRXaaWotPICgYsdhgAAA00"]
[Tue Mar 17 08:28:40.517183 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:49454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk66AeiSKl8TjouI-b6zAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:29:59.017001 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.241.46:50450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7NxePVOt35XCGZP8nzgAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:21.002349 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.243.203:59716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7TVKJy4A1bGlmj9BOFAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:23.538000 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:40632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7T5DEJR9VXonE_-1GegAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:30:27.109838 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.241.46:49980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7U-82sZHvlq4xgHq7rAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:30:32.606844 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:33662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7WAQohV2v-7oj5HHzPQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:46.015904 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:33678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7ZgQohV2v-7oj5HHzWQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:49.608654 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:39846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7aZDEJR9VXonE_-1GgQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:30:52.635517 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:41236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7bFKJy4A1bGlmj9BOGQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:30:54.971127 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.241.46:41252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7bXRXaaWotPICgYsdoQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:58.415540 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:41264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7cpDEJR9VXonE_-1GhAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:06.115277 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:56006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7eu82sZHvlq4xgHq71AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:07.437188 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:47450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7e3RXaaWotPICgYsdpgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:08.739450 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:47462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fJqmL8PQht4WJFlBFgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:10.036466 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:47470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fgeiSKl8TjouI-b63AAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:10.256102 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:54438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fpDEJR9VXonE_-1GkAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:11.349755 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:38632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fweiSKl8TjouI-b63QAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:12.645877 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:38634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7gAeiSKl8TjouI-b63wAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:13.967572 2026] [:error] [pid 1210:tid 140411557287680] [client 74.7.243.203:38638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7gVKJy4A1bGlmj9BOHgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:17.420218 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.243.203:38650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7hVKJy4A1bGlmj9BOJAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:18.693920 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:38660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7hgQohV2v-7oj5HHzaAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:19.885952 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:38662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7h9CmCSWTlPouqorD3gAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:21.230827 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.243.203:55800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7iQQohV2v-7oj5HHzaQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:22.538660 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7itCmCSWTlPouqorD3wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:23.589001 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:58544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7iweiSKl8TjouI-b66gAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:23.881712 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:55816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7iweiSKl8TjouI-b66wAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:24.891031 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:57514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jJDEJR9VXonE_-1GkQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:26.067089 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.241.46:57530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jlKJy4A1bGlmj9BOKAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:26.186281 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:55828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jqBJNF7axNlVR0X1ZQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:27.358990 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.241.46:57546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jwQohV2v-7oj5HHzawAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:27.437677 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:55842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7j5qmL8PQht4WJFlBGwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:28.661252 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.241.46:40816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7kBePVOt35XCGZP8n1QAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:28.767662 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:55854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7kNCmCSWTlPouqorD4QAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:29.835608 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7kaBJNF7axNlVR0X1ZgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:30.025062 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:55858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7klKJy4A1bGlmj9BOKQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:31.112254 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7k9CmCSWTlPouqorD4gAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:32.253801 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7lJqmL8PQht4WJFlBHAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:34.447515 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:40860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7lXRXaaWotPICgYsdrgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:34.450309 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:58482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7le82sZHvlq4xgHq77gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:35.755494 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:40866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7l6BJNF7axNlVR0X1aAAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:35.839259 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:58496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7l9CmCSWTlPouqorD5AAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:36.948904 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:40872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7mJDEJR9VXonE_-1GlAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:37.142022 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.243.203:58498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7mZDEJR9VXonE_-1GlQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:38.254501 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:41824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7mpDEJR9VXonE_-1GlgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:39.466758 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:41840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7m9CmCSWTlPouqorD5wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:39.571306 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:58508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7m5DEJR9VXonE_-1GmAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:31:40.636998 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:41848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7nHRXaaWotPICgYsdrwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:41.936128 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:41850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7nRePVOt35XCGZP8n2QAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:43.443047 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:41854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7n5DEJR9VXonE_-1GmgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:45.762002 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:41870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7oZDEJR9VXonE_-1GmwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:47.939456 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:59854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7otCmCSWTlPouqorD7gAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:47.940672 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:41880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7o5DEJR9VXonE_-1GnAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:49.256448 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:44016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7pdCmCSWTlPouqorD7wAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:50.396061 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.241.46:44018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7ppDEJR9VXonE_-1GnwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:51.495782 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.243.203:59870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7p5DEJR9VXonE_-1GogAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:31:51.707581 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:44022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7p5qmL8PQht4WJFlBHgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:53.438823 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:44030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7qKBJNF7axNlVR0X1bQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:54.744555 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.241.46:44038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7qgQohV2v-7oj5HHzbwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:56.056740 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.241.46:44046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rJqmL8PQht4WJFlBIAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:57.394571 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rQQohV2v-7oj5HHzcAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:58.115942 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:39766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rpDEJR9VXonE_-1GpwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:58.676573 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.241.46:47076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rnRXaaWotPICgYsdsAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:59.998789 2026] [:error] [pid 7000:tid 140411540502272] [client 74.7.241.46:47084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rxePVOt35XCGZP8n3gAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:01.332134 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:47088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7sQQohV2v-7oj5HHzdQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:02.823787 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.241.46:47104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7shePVOt35XCGZP8n3wAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:04.041428 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.46:47110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7tAeiSKl8TjouI-b67gAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:05.411863 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:47112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7te82sZHvlq4xgHq8DQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:05.669028 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:47112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7te82sZHvlq4xgHq8DwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:06.996190 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:47124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7ttCmCSWTlPouqorD8wAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:08.177060 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:59408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7uNCmCSWTlPouqorD9AAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:09.510950 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:59422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7udCmCSWTlPouqorD9gAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:10.734299 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:59430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7uqBJNF7axNlVR0X1cAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:12.052298 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:59436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7vAeiSKl8TjouI-b68AAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:13.387050 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.241.46:59442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7vZqmL8PQht4WJFlBIgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:15.853444 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.241.46:59446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7vpqmL8PQht4WJFlBJAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:17.148818 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:59462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wRePVOt35XCGZP8n4gAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:18.310167 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:51896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wqBJNF7axNlVR0X1cQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:18.595054 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:51896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wqBJNF7axNlVR0X1cgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:19.915769 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:51910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wxePVOt35XCGZP8n4wAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:21.086866 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:51912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7xRePVOt35XCGZP8n5AAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:22.601036 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:51914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7xtCmCSWTlPouqorD-AAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:23.905344 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:51920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7x5DEJR9VXonE_-1GqgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:25.157315 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:51928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7yVKJy4A1bGlmj9BOMQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:26.356343 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:51932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7yu82sZHvlq4xgHq8IgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:27.532869 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.241.46:51944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7y3RXaaWotPICgYsdtQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:28.836289 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.241.46:40836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7zFKJy4A1bGlmj9BOMgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:30.014914 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7zgeiSKl8TjouI-b68wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:31.334363 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:40856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7z5qmL8PQht4WJFlBJgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:32.519154 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.241.46:40872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk70HRXaaWotPICgYsdtgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:33.828325 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.241.46:40884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk70ZqmL8PQht4WJFlBJwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:35.160484 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.241.46:40900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk709CmCSWTlPouqorD-gAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:36.422708 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.241.46:40916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk71FKJy4A1bGlmj9BONAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:37.752554 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk71QQohV2v-7oj5HHzmQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:39.061254 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:36694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk71wQohV2v-7oj5HHzmwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:40.450229 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:36708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk72JqmL8PQht4WJFlBLAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:42.019686 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:36724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk72gQohV2v-7oj5HHzoAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:43.339558 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:36730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk72-82sZHvlq4xgHq8NQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:44.638134 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:36732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk73AQohV2v-7oj5HHzpAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:45.859531 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:36748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk73ZqmL8PQht4WJFlBLgAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:48.241476 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:36758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk73-82sZHvlq4xgHq8OQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:49.325150 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.243.203:39776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk74QQohV2v-7oj5HHzpwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:32:49.525399 2026] [:error] [pid 1961:tid 140411666392832] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk74XRXaaWotPICgYsduAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:50.719754 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:54690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk74qBJNF7axNlVR0X1eAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:52.056422 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:54698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75NCmCSWTlPouqorD_QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:53.235376 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75aBJNF7axNlVR0X1eQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:54.574715 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:54714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75nRXaaWotPICgYsdugAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:55.795487 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.241.46:54726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75wQohV2v-7oj5HHzqAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:58.392946 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.241.46:54728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk76ZqmL8PQht4WJFlBMwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:59.702488 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:33114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk76wQohV2v-7oj5HHzqQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:33:01.030453 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:33120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk77XRXaaWotPICgYsduwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:33:04.602917 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:33122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk78NCmCSWTlPouqorEAgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:33:05.573267 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.244.31:35912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk78RePVOt35XCGZP8n-wAAA4A"]
[Tue Mar 17 08:33:19.031825 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.228.16:40288] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk7_-82sZHvlq4xgHq8SgAAApc"]
[Tue Mar 17 08:33:22.491516 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.243.203:39856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8AhePVOt35XCGZP8oGgAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:33:41.194305 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:34178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8FdCmCSWTlPouqorEMgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:33:49.252430 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:34854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8He82sZHvlq4xgHq8VAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:34:09.375191 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:56104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8MaBJNF7axNlVR0X1mAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:34:29.164885 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:33134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8RRePVOt35XCGZP8oXAAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:31.551983 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:52992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8R-82sZHvlq4xgHq8WQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:32.893492 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:52998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8SJDEJR9VXonE_-1GxAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:34:36.179091 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:53014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8TAeiSKl8TjouI-b7CAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:37.427092 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:53022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8TZDEJR9VXonE_-1GxgAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:52.113389 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:60834] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8XAeiSKl8TjouI-b7GwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:35:05.216636 2026] [:error] [pid 1961:tid 140411733534464] [client 74.7.241.46:47386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8aXRXaaWotPICgYsd3QAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:35:15.057662 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:44526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8cweiSKl8TjouI-b7JQAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:35:20.939968 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:54078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8eAQohV2v-7oj5HH0BQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:35:40.266383 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:33184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8jFKJy4A1bGlmj9BOeQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:35:40.492111 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.243.203:46188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8jFKJy4A1bGlmj9BOegAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:35:42.644995 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:37824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8ju82sZHvlq4xgHq8aQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:36:32.766952 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:34210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8wBePVOt35XCGZP8ozwAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:36:34.103665 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:44314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8wnRXaaWotPICgYsd8wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:36:41.002876 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:44320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8yQeiSKl8TjouI-b7OgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:36:44.759220 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:56940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8zBePVOt35XCGZP8o4AAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:37:18.459166 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.241.46:37828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk87hePVOt35XCGZP8o_AAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:37:24.347207 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:41106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk89O82sZHvlq4xgHq8hAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:37:29.971055 2026] [:error] [pid 1961:tid 140411624429312] [client 74.7.241.46:41108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8-XRXaaWotPICgYseCAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:37:32.941107 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:56908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8_KBJNF7axNlVR0X1wgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:38:05.448429 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.228.16:45964] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk9HXRXaaWotPICgYseGAAAA0s"]
[Tue Mar 17 08:38:26.024545 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:56924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9Mu82sZHvlq4xgHq8tQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:38:39.671326 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:56946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9P9CmCSWTlPouqorFCQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:38:39.859055 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:45408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9PweiSKl8TjouI-b7XgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:38:49.148885 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:58198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9SXRXaaWotPICgYseMwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:38:56.846683 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.241.46:46718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9UFKJy4A1bGlmj9BO8wAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:39:14.557572 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:38134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9YgeiSKl8TjouI-b7fwAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:40:31.523763 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:59260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9r3RXaaWotPICgYseigAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:41:07.275681 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:44772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk90qBJNF7axNlVR0X1-gAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:41:08.602927 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:53758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk91FKJy4A1bGlmj9BPMAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:41:10.542395 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.241.46:53774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk91QQohV2v-7oj5HH0YAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:41:11.911657 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:53786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk913RXaaWotPICgYsekgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:41:14.040349 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.46:53788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk92QeiSKl8TjouI-b7pAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:41:58.602751 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:53796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-BtCmCSWTlPouqorFYwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:42:28.512851 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:42342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-JBePVOt35XCGZP8psQAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:42:53.730843 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:53458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-PXRXaaWotPICgYsexgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:43:09.302924 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.244.31:56446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk-TZDEJR9VXonE_-1HtAAAAQM"]
[Tue Mar 17 08:43:25.524808 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:42508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-XZDEJR9VXonE_-1HyQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:43:37.007145 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:60130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-aQQohV2v-7oj5HH07QAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:43:39.564834 2026] [:error] [pid 1961:tid 140411624429312] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-a3RXaaWotPICgYse0QAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:43:39.957993 2026] [mime_magic:error] [pid 7437:tid 140411691570944] (70014)End of file found: [client 74.7.243.203:53376] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc
[Tue Mar 17 08:44:05.560920 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.243.203:56754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-hQQohV2v-7oj5HH1HgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:44:55.110793 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:52362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-twQohV2v-7oj5HH1VgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:45:00.585077 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-vAQohV2v-7oj5HH1XwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:45:02.324992 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:46478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-vhePVOt35XCGZP8p1QAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:45:05.542086 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:46486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-wdCmCSWTlPouqorFugAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:45:27.523749 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:46500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-13RXaaWotPICgYse_AAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:45:55.903386 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:54940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-85DEJR9VXonE_-1IEQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:46:08.403213 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.243.203:46160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_AAQohV2v-7oj5HH1cwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:46:25.090378 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.241.46:52454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_DxePVOt35XCGZP8p-wAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:46:33.415372 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:46168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_GXRXaaWotPICgYsfFgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:46:43.215273 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:59444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_IRePVOt35XCGZP8qCQAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:47:02.181117 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.241.46:59800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_NpqmL8PQht4WJFlB5QAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:47:03.528440 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.241.46:57664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_N5DEJR9VXonE_-1IMQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:47:10.563272 2026] [:error] [pid 1961:tid 140411557287680] [client 74.7.241.46:57666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_PnRXaaWotPICgYsfJQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:47:46.980330 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:45754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_YqBJNF7axNlVR0X3FwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:47:48.725566 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:52068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_ZJDEJR9VXonE_-1INwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:10.390565 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.244.31:58256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk_epqmL8PQht4WJFlB7wAAAVA"]
[Tue Mar 17 08:48:13.463416 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:52960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_faBJNF7axNlVR0X3RwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:48:22.390199 2026] [:error] [pid 1961:tid 140411624429312] [client 74.7.228.16:49392] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk_hnRXaaWotPICgYsfMAAAA04"]
[Tue Mar 17 08:48:22.735511 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:37962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_hqBJNF7axNlVR0X3VwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:48:50.219030 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:47860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_oqBJNF7axNlVR0X3iwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:51.543457 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:36342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_o3RXaaWotPICgYsfNwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:52.795612 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:36352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_pJDEJR9VXonE_-1IQwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:55.022439 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:36356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_ppqmL8PQht4WJFlB-wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:57.243875 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:36366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_qO82sZHvlq4xgHq9ugAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:58.528264 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.243.203:36374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_qhePVOt35XCGZP8qGgAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:58.950585 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.243.203:36386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_qlKJy4A1bGlmj9BP6AAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:00.295830 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:40610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_rNCmCSWTlPouqorGJgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:01.467935 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:40612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_rZqmL8PQht4WJFlCAAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:02.877172 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:40622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_rpqmL8PQht4WJFlCAQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:08.622594 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.243.203:40632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_tFKJy4A1bGlmj9BP8QAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:09.906723 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.243.203:40636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_tZDEJR9VXonE_-1IVQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:11.202749 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_twQohV2v-7oj5HH1ogAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:12.465346 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_uAeiSKl8TjouI-b8WgAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:13.766775 2026] [:error] [pid 1961:tid 140411733534464] [client 74.7.243.203:46134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_uXRXaaWotPICgYsfOwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:15.041632 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.243.203:46150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_uxePVOt35XCGZP8qIgAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:16.344416 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:46156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_vJDEJR9VXonE_-1IXwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:17.662582 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:46164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_vZDEJR9VXonE_-1IYQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:19.604472 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:46180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_vgeiSKl8TjouI-b8YAAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:20.889288 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:47594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_wAeiSKl8TjouI-b8YQAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:23.280914 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:47600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_w-82sZHvlq4xgHq9wgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:24.623919 2026] [:error] [pid 1961:tid 140411599251200] [client 74.7.243.203:47614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_xHRXaaWotPICgYsfPQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:25.979687 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:47626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_xe82sZHvlq4xgHq9wwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:27.291337 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.243.203:47632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_x1KJy4A1bGlmj9BP8wAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:28.557064 2026] [:error] [pid 1961:tid 140411741927168] [client 74.7.243.203:47636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_yHRXaaWotPICgYsfPgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:29.863648 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:47638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_yQeiSKl8TjouI-b8ZwAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:31.698615 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:43534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_y9CmCSWTlPouqorGMAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:35.315709 2026] [:error] [pid 1961:tid 140411557287680] [client 74.7.243.203:43536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_znRXaaWotPICgYsfQAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:37.622563 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.243.203:43548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_0BePVOt35XCGZP8qLgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:39.191673 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:43560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_0weiSKl8TjouI-b8bgAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:42.733916 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:37260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_1pqmL8PQht4WJFlCGAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:44.058781 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.243.203:37274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_2FKJy4A1bGlmj9BP-QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:45.398333 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.243.203:37282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_2VKJy4A1bGlmj9BP-gAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:48.049666 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:37284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_2lKJy4A1bGlmj9BP-wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:49.589916 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:37298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_3XRXaaWotPICgYsfQQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:50.864864 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_3geiSKl8TjouI-b8cwAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:52.364012 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:52076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_4KBJNF7axNlVR0X3wQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:53.811396 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:60004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_4ZqmL8PQht4WJFlCGwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:54.360421 2026] [:error] [pid 7000:tid 140411565680384] [client 74.7.243.203:54708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_4hePVOt35XCGZP8qPgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:55.022296 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:60006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_45DEJR9VXonE_-1IfAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:55.697787 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.243.203:54716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_45DEJR9VXonE_-1IfQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:56.204112 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.241.46:60014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_5HRXaaWotPICgYsfRgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:57.940731 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:60024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_5ZqmL8PQht4WJFlCHgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:57.944743 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:54726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_5e82sZHvlq4xgHq90AAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:59.221793 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:54734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_55qmL8PQht4WJFlCHwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:59.293063 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.241.46:38282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_59CmCSWTlPouqorGNwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:01.671945 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:38294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_6AeiSKl8TjouI-b8dQAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:01.675675 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:60006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_6JqmL8PQht4WJFlCIgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:04.016032 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.243.203:60008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7JqmL8PQht4WJFlCJAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:04.217939 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.241.46:38302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7HRXaaWotPICgYsfSQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:05.383389 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.243.203:60014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7XRXaaWotPICgYsfSwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:05.566543 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:38314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7QeiSKl8TjouI-b8dwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:06.697792 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:60016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7pDEJR9VXonE_-1IhQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:06.766855 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.241.46:38318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7lKJy4A1bGlmj9BQAAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:08.114279 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:58726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8NCmCSWTlPouqorGPQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:09.263234 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.241.46:58738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8e82sZHvlq4xgHq90gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:10.314183 2026] [:error] [pid 7000:tid 140411658000128] [client 74.7.243.203:60032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8hePVOt35XCGZP8qQQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:10.630101 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:58750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8gQohV2v-7oj5HH1tAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:11.695284 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:48996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_83RXaaWotPICgYsfTgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:11.959425 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.241.46:58766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8xePVOt35XCGZP8qQwAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:13.091122 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:49004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9RePVOt35XCGZP8qRAAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:13.363511 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.241.46:58776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9e82sZHvlq4xgHq91AAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:14.452699 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9qBJNF7axNlVR0X3xQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:14.774904 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:58786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9hePVOt35XCGZP8qRgAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:15.774090 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.243.203:49020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_93RXaaWotPICgYsfUQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:16.117382 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:58802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-AQohV2v-7oj5HH1tgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:17.306885 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:58812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-aBJNF7axNlVR0X3xwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:18.615257 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:49654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-u82sZHvlq4xgHq91wAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:18.753890 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:49026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-u82sZHvlq4xgHq92AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:19.920698 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.46:49658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-9CmCSWTlPouqorGQAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:20.023424 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:49032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__KBJNF7axNlVR0X3yQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:21.251223 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.241.46:49662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__QeiSKl8TjouI-b8fgAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:21.323964 2026] [:error] [pid 1961:tid 140411658000128] [client 74.7.243.203:33640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__XRXaaWotPICgYsfUwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:22.715702 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:49674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__u82sZHvlq4xgHq92gAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:23.971129 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:33656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__1KJy4A1bGlmj9BQCwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:24.014549 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.241.46:49678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAAJqmL8PQht4WJFlCNAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:25.947201 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:49686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAAVKJy4A1bGlmj9BQDAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:25.951125 2026] [:error] [pid 7000:tid 140411565680384] [client 74.7.243.203:33664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAARePVOt35XCGZP8qTgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:27.293703 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:33676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAA5DEJR9VXonE_-1ImwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:28.419215 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:49702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablABAQohV2v-7oj5HH1vwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:29.783317 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:55734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablABZqmL8PQht4WJFlCOAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:29.820467 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.243.203:33686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablABRePVOt35XCGZP8qUQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:32.088282 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.241.46:55738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACNCmCSWTlPouqorGRwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:33.429250 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:55748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACdCmCSWTlPouqorGSQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:34.748650 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:55756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACpDEJR9VXonE_-1IowAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:35.960594 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.46:55762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACweiSKl8TjouI-b8hgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:36.663553 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:56018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablADKBJNF7axNlVR0X30wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:37.318361 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablADRePVOt35XCGZP8qXQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:39.403259 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:41038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablADnRXaaWotPICgYsfXgAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:42.930806 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:41052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAEpDEJR9VXonE_-1IrQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:49.809040 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.243.203:56030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAGRePVOt35XCGZP8qcQAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:52.435328 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:41056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAHJDEJR9VXonE_-1IvAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:55.939475 2026] [:error] [pid 7000:tid 140411607643904] [client 74.7.241.46:53516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAHxePVOt35XCGZP8qhwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:57.244532 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:53524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAIZqmL8PQht4WJFlCPAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:51:37.739440 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.243.203:55604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablASRePVOt35XCGZP8q0gAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:51:44.742451 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:59342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAUBePVOt35XCGZP8q2wAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:51:46.042482 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:43620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAUu82sZHvlq4xgHq97QAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:51:48.425710 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:43632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAVHRXaaWotPICgYsfhAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:51:56.624811 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:60404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAXKBJNF7axNlVR0X38QAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:00.024865 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.243.203:51906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYAQohV2v-7oj5HH15wAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:00.910732 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:50038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYJDEJR9VXonE_-1I7QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:02.440081 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.243.203:50044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYpDEJR9VXonE_-1I8QAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:03.783913 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.243.203:50050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYwQohV2v-7oj5HH16AAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:05.105983 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:50060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAZe82sZHvlq4xgHq99QAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:06.478009 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:50076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAZgQohV2v-7oj5HH16gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:07.802985 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:50086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAZxePVOt35XCGZP8q5AAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:11.536568 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.243.203:50088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAalKJy4A1bGlmj9BQKwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:11.539755 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.241.46:60416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAa5DEJR9VXonE_-1JAgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:52:12.863424 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:41422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbJDEJR9VXonE_-1JBAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:14.117037 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:58184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbpDEJR9VXonE_-1JBwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:14.226840 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbnRXaaWotPICgYsfkAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:15.481111 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.243.203:41454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbxePVOt35XCGZP8q5gAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:16.797140 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:41460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAcO82sZHvlq4xgHq99wAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:18.095310 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:41472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAcu82sZHvlq4xgHq9-AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:19.483492 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:41482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAcxePVOt35XCGZP8q6gAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:20.827425 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:53302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAdO82sZHvlq4xgHq9-wAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:22.159138 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:53312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAdtCmCSWTlPouqorGdwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:23.498755 2026] [:error] [pid 1961:tid 140411565680384] [client 74.7.243.203:53314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAd3RXaaWotPICgYsflgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:24.283066 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAeBePVOt35XCGZP8q7wAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:52:24.793067 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.243.203:53316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAeAQohV2v-7oj5HH17QAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:26.067358 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.243.203:53326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAegQohV2v-7oj5HH17gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:27.407303 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:53336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAe6BJNF7axNlVR0X3-wAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:28.595199 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.243.203:53346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAfFKJy4A1bGlmj9BQLQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:29.923335 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAfXRXaaWotPICgYsfmgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:31.081886 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.243.203:52568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAf1KJy4A1bGlmj9BQMAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:32.408078 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.243.203:52576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAgAQohV2v-7oj5HH19AAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:33.545200 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.243.203:52580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAgQQohV2v-7oj5HH19gAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:35.804633 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:52582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAglKJy4A1bGlmj9BQNQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:37.129159 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAhVKJy4A1bGlmj9BQNgAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:38.448006 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.243.203:52594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAhlKJy4A1bGlmj9BQOAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:39.746410 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:52604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAh-82sZHvlq4xgHq-AQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:41.065114 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:38034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAiZqmL8PQht4WJFlCWwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:42.215649 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:38044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAiu82sZHvlq4xgHq-AwAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:44.402851 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:38056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAi9CmCSWTlPouqorGggAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:45.691360 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.243.203:38066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAjRePVOt35XCGZP8q8AAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:46.838747 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:38074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAju82sZHvlq4xgHq-BAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:48.151261 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.243.203:38080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAkAQohV2v-7oj5HH1-AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:49.455159 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.243.203:38092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAkQQohV2v-7oj5HH1-gAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:50.659043 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAklKJy4A1bGlmj9BQOgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:51.923318 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:59574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAk3RXaaWotPICgYsfngAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:53.271640 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:59590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAlXRXaaWotPICgYsfnwAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:55.679112 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.243.203:59594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAlxePVOt35XCGZP8q9AAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:57.011069 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.243.203:59608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAmVKJy4A1bGlmj9BQPQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:58.299123 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.243.203:59618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAmgQohV2v-7oj5HH1-wAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:06.355437 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:59628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAou82sZHvlq4xgHq-EQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:53:20.206950 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.243.203:50624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAsFKJy4A1bGlmj9BQTAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:24.399205 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.228.16:35846] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablAtJDEJR9VXonE_-1JEAAAAQc"]
[Tue Mar 17 08:53:39.112328 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:56568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAwgeiSKl8TjouI-b9GwAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:44.101203 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:40248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAyO82sZHvlq4xgHq-GAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:46.025271 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:54878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAyqBJNF7axNlVR0X4QwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:48.442244 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:46406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAzO82sZHvlq4xgHq-HQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:11.720332 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.241.46:51648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA4wQohV2v-7oj5HH2GgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:54:13.147495 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.46:45492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA5QeiSKl8TjouI-b9NgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:19.242741 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:45498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA6xePVOt35XCGZP8rGAAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:20.485070 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:42392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA7AQohV2v-7oj5HH2HAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:22.906455 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:40254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA7geiSKl8TjouI-b9PwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:24.220557 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.243.203:33594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA8FKJy4A1bGlmj9BQXAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:25.555000 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA8e82sZHvlq4xgHq-KAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:26.715821 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:33606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA8qBJNF7axNlVR0X4UAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:28.053924 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.243.203:33622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA9JqmL8PQht4WJFlCdQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:30.431436 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:33636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA9nRXaaWotPICgYsf2gAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:31.795352 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:46072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA9weiSKl8TjouI-b9QQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:33.107807 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:46088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA-aBJNF7axNlVR0X4VQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:36.391830 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:46098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_O82sZHvlq4xgHq-LAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:37.716609 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:46104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_ZqmL8PQht4WJFlCewAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:39.011876 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:46110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_5DEJR9VXonE_-1JJAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:39.078636 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:42404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_1KJy4A1bGlmj9BQagAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:54:40.404882 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:56400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBABePVOt35XCGZP8rGwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:41.717942 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:56414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBAe82sZHvlq4xgHq-LQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:43.119734 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.243.203:56418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBAwQohV2v-7oj5HH2HgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:44.426357 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.243.203:56430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBBAQohV2v-7oj5HH2IAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:45.631045 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:56438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBBZDEJR9VXonE_-1JJwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:46.960897 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:56442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBBqBJNF7axNlVR0X4VwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:50.387384 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.243.203:56452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBClKJy4A1bGlmj9BQbQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:05.591024 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:34796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBGXRXaaWotPICgYsgDgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:55:15.204148 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:55728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBIweiSKl8TjouI-b9UgAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:55:16.620142 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:53758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBJNCmCSWTlPouqorGugAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:55:48.116894 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:43346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBRAQohV2v-7oj5HH2XwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:49.496570 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:40404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBRaBJNF7axNlVR0X4XwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:51.631477 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.243.203:38372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBRwQohV2v-7oj5HH2YwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:51.823713 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:40418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBR1KJy4A1bGlmj9BQfQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:54.467390 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:40426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBSpqmL8PQht4WJFlChQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:55.761995 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:40440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBS9CmCSWTlPouqorGwwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:57.092034 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:40442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBTVKJy4A1bGlmj9BQfgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:01.228244 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.241.46:41040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBUVKJy4A1bGlmj9BQggAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:04.092481 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:41046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBVAeiSKl8TjouI-b9XQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:05.463569 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:50044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBVdCmCSWTlPouqorGzQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:06.685813 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.243.203:54428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBVgQohV2v-7oj5HH2cQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:10.907292 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:41056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBWgQohV2v-7oj5HH2dQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:12.225684 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:48764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBXJqmL8PQht4WJFlCiQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:21.251970 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBZQeiSKl8TjouI-b9dgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:24.366967 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:54440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBaAeiSKl8TjouI-b9eQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:56:25.639557 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:39470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBaXRXaaWotPICgYsgRwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:26.952880 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:39484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBapDEJR9VXonE_-1JPwAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:28.157771 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.241.46:47616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBbAQohV2v-7oj5HH2egAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:32.087762 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:55632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBb6BJNF7axNlVR0X4cgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:56:33.176538 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:47630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBcZDEJR9VXonE_-1JRQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:34.451688 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:53476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBcpDEJR9VXonE_-1JSQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:56:36.653526 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:47642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBdO82sZHvlq4xgHq-mwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:38.999369 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:47654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBdgQohV2v-7oj5HH2fQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:42.671654 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:58014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBegQohV2v-7oj5HH2gQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:45.171823 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:58022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBfVKJy4A1bGlmj9BQkQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:46.451422 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:58024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBfu82sZHvlq4xgHq-pQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:47.778867 2026] [:error] [pid 1961:tid 140411666392832] [client 74.7.241.46:58028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBf3RXaaWotPICgYsgTwAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:52.907338 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:60900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBhBePVOt35XCGZP8reAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:05.536278 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.243.203:53484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBkZDEJR9VXonE_-1JaAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:57:07.516521 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:60916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBkweiSKl8TjouI-b9igAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:10.157280 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:59210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBltCmCSWTlPouqorG3QAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:57:10.946277 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBllKJy4A1bGlmj9BQoAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:12.806611 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:34908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBmAQohV2v-7oj5HH2hgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:15.499340 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:34918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBm5qmL8PQht4WJFlClAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:16.890035 2026] [:error] [pid 1961:tid 140411565680384] [client 74.7.243.203:34924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBnHRXaaWotPICgYsgWgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:17.599160 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:60916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBne82sZHvlq4xgHq-xwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:18.236090 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:34934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBngQohV2v-7oj5HH2iAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:18.983084 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:58996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBnqBJNF7axNlVR0X4eQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:19.607982 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.243.203:34940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBnwQohV2v-7oj5HH2iQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:20.910175 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:38652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBoAeiSKl8TjouI-b9iwAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:22.187117 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:38660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBogeiSKl8TjouI-b9jgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:23.379501 2026] [:error] [pid 1961:tid 140411557287680] [client 74.7.243.203:38676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBo3RXaaWotPICgYsgXQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:23.463511 2026] [:error] [pid 7000:tid 140411607643904] [client 74.7.241.46:59008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBoxePVOt35XCGZP8rgwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:24.787089 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.243.203:38682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBpJDEJR9VXonE_-1JbgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:24.879059 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:59020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBpJDEJR9VXonE_-1JbwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:26.147824 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:38690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBpu82sZHvlq4xgHq-0gAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:27.442806 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:38700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBp-82sZHvlq4xgHq-1AAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:29.271269 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.241.46:59024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBqVKJy4A1bGlmj9BQpAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:30.539434 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:53278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBqpqmL8PQht4WJFlClwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:31.103092 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.243.203:38706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBq5DEJR9VXonE_-1JcgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:32.426708 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:55414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBrNCmCSWTlPouqorG4gAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:33.702578 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.243.203:55420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBrZqmL8PQht4WJFlCmAAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:34.986539 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:55434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBrqBJNF7axNlVR0X4gAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:35.033193 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:53280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBr6BJNF7axNlVR0X4gQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:36.299627 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:55438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsO82sZHvlq4xgHq-3QAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:37.567017 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.243.203:55454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsZDEJR9VXonE_-1JdQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:38.721248 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:53282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsqBJNF7axNlVR0X4hQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:38.883148 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:55456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsu82sZHvlq4xgHq-4QAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:42.755445 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:51024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBttCmCSWTlPouqorG5QAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:50.807680 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:43496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBvlKJy4A1bGlmj9BQrQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:55.623534 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:57650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBwxePVOt35XCGZP8rjgAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:55.900835 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:51040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBw3RXaaWotPICgYsgcAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:56.918671 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:57658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBxAeiSKl8TjouI-b9lwAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:57.194095 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.243.203:35816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBxVKJy4A1bGlmj9BQrwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:58.548997 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.243.203:35826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBxnRXaaWotPICgYsgcwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:59.180331 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:49340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBx9CmCSWTlPouqorG6wAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:59.855445 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.243.203:35840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBx3RXaaWotPICgYsgdAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:00.486477 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:49348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablByAeiSKl8TjouI-b9mgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:01.159123 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablByQQohV2v-7oj5HH2kgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:01.679935 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.241.46:49358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablByVKJy4A1bGlmj9BQsQAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:02.644233 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:49240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBygQohV2v-7oj5HH2lAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:03.955617 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:49250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBywQohV2v-7oj5HH2mAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:05.362108 2026] [:error] [pid 1961:tid 140411716749056] [client 74.7.243.203:49258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBzXRXaaWotPICgYsgdQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:06.564278 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:49266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBztCmCSWTlPouqorG7QAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:07.891053 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.243.203:49280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBz9CmCSWTlPouqorG7wAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:09.156993 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:49282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB0XRXaaWotPICgYsgdgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:10.453231 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.243.203:50180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB0geiSKl8TjouI-b9pAAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:11.661438 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:50196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB0-82sZHvlq4xgHq-_wAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:13.004211 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:50198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB1RePVOt35XCGZP8rkAAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:13.346371 2026] [:error] [pid 1961:tid 140411733534464] [client 74.7.244.31:51090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablB1XRXaaWotPICgYsgdwAAA0E"]
[Tue Mar 17 08:58:14.144698 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:50202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB1qBJNF7axNlVR0X4igAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:15.287222 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.243.203:50214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB15DEJR9VXonE_-1JfQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:15.943202 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:49366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB1weiSKl8TjouI-b9qgAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:16.580447 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:50228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB2AQohV2v-7oj5HH2mgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:17.856792 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:50242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB2ZqmL8PQht4WJFlCpQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:19.174054 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:50254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB2wQohV2v-7oj5HH2mwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:21.758670 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:43690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB3ZDEJR9VXonE_-1JfwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:23.072170 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:43692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB33RXaaWotPICgYsgeQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:24.307918 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:43708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB4JDEJR9VXonE_-1JgwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:26.513107 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:43718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB4aBJNF7axNlVR0X4jQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:27.816284 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:43734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB45qmL8PQht4WJFlCrwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:29.093949 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:43736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB5ZqmL8PQht4WJFlCsQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:58:31.083417 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:54148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB55qmL8PQht4WJFlCtgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:33.488649 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:46762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB6e82sZHvlq4xgHq_BQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:34.847305 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:46776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB6qBJNF7axNlVR0X4jwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:46.148781 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:46792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB9qBJNF7axNlVR0X4nAAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:48.639984 2026] [:error] [pid 1961:tid 140411741927168] [client 74.7.241.46:38972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB-HRXaaWotPICgYsgggAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:51.020020 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:42036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB--82sZHvlq4xgHq_DQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:52.314708 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:42044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB_FKJy4A1bGlmj9BQ1QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:04.199554 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:42050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCCJDEJR9VXonE_-1JmAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:06.324423 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:40596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCCQeiSKl8TjouI-b9uAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:07.303414 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:54964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCC5qmL8PQht4WJFlC1QAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:07.591951 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:40598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCC9CmCSWTlPouqorG-QAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:08.595255 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:49512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCDKBJNF7axNlVR0X4oQAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:09.772657 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:49516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCDe82sZHvlq4xgHq_EQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:10.960467 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:51374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCDu82sZHvlq4xgHq_EwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:13.255305 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:55450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCEZqmL8PQht4WJFlC3AAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:14.450000 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCEqBJNF7axNlVR0X4pQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:16.983610 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:51390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCFBePVOt35XCGZP8rpQAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:18.333034 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:46724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCFhePVOt35XCGZP8rpwAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:45.991314 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:46736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCMZDEJR9VXonE_-1JtQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:48.488398 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:39052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCNJDEJR9VXonE_-1JvAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:53.368935 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCOe82sZHvlq4xgHq_OwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:22.419073 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.241.46:42962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCVnRXaaWotPICgYsgrgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:28.658184 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.243.203:53814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCXJDEJR9VXonE_-1J7gAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:32.855157 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.241.46:36560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCYJDEJR9VXonE_-1J8gAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:34.136997 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:35376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCYqBJNF7axNlVR0X4ugAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:34.387562 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:38132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCYqBJNF7axNlVR0X4uwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:38.600247 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:35388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCZpqmL8PQht4WJFlC9wAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:42.249560 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.241.46:46946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCalKJy4A1bGlmj9BRRgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:48.619914 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:32824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCcAeiSKl8TjouI-b-EgAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:50.033084 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:46566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCcpDEJR9VXonE_-1J9gAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:51.248982 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.243.203:45262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCcxePVOt35XCGZP8ruwAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:53.578452 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:45278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCdJqmL8PQht4WJFlC-gAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:53.596607 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.46:46960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCdQeiSKl8TjouI-b-GAAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:55.986706 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.241.46:47244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCdwQohV2v-7oj5HH2xwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:57.203754 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.243.203:45294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCeQQohV2v-7oj5HH2yQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:00:58.478928 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.243.203:45310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCehePVOt35XCGZP8rwAAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:01:02.079999 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:47260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCfhePVOt35XCGZP8rxAAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:04.836327 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:45322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCf-82sZHvlq4xgHq_TAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:01:08.070218 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.241.46:47938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCg3RXaaWotPICgYsg_AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:09.483007 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:56574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablChe82sZHvlq4xgHq_TQAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:15.255484 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.243.203:36896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCixePVOt35XCGZP8rzwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:01:27.615419 2026] [:error] [pid 7000:tid 140411540502272] [client 74.7.241.46:56576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablClxePVOt35XCGZP8r3QAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:30.028470 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:35414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCmu82sZHvlq4xgHq_UwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:01:31.330903 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCm1KJy4A1bGlmj9BRiwAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:35.047740 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:35436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCn5qmL8PQht4WJFlDEQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:01:51.511462 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:35448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCr1KJy4A1bGlmj9BRrwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:57.487888 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:43214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCte82sZHvlq4xgHq_YAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:01:59.814368 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:47120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCt9CmCSWTlPouqorHLwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:02:15.659281 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:46080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCx6BJNF7axNlVR0X5OQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:19.074493 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:57920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCy6BJNF7axNlVR0X5PAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:20.367082 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:33516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCzNCmCSWTlPouqorHPAAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:21.870575 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:33530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCzQQohV2v-7oj5HH2-QAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:23.354143 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:33536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCz3RXaaWotPICgYshYAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:25.634660 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:33550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC0dCmCSWTlPouqorHQgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:26.944660 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:33564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC0qBJNF7axNlVR0X5PwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:30.753181 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:33580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC1qBJNF7axNlVR0X5QwAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:33.107389 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.243.203:57260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC2RePVOt35XCGZP8r9QAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:34.427204 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:57270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC2geiSKl8TjouI-b-QQAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:35.739540 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:57284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC23RXaaWotPICgYshZQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:37.981237 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.243.203:57286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC3e82sZHvlq4xgHq_bgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:39.326455 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.243.203:57288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC33RXaaWotPICgYshaAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:41.699587 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.243.203:40818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC4QQohV2v-7oj5HH3EgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:43.009396 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:40828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC49CmCSWTlPouqorHRgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:48.755151 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.243.203:40842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC6FKJy4A1bGlmj9BR8QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:50.022482 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:40850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC6qBJNF7axNlVR0X5RgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:53.512890 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:43316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC7ZqmL8PQht4WJFlDMwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:54.786357 2026] [:error] [pid 1961:tid 140411599251200] [client 74.7.243.203:43320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC7nRXaaWotPICgYshbwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:56.975668 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:43334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC8O82sZHvlq4xgHq_dQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:58.259967 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:43336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC8pqmL8PQht4WJFlDNQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:59.415114 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:43340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC8-82sZHvlq4xgHq_dgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:00.720336 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:39200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC9O82sZHvlq4xgHq_dwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:02.191361 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:39212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC9u82sZHvlq4xgHq_egAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:02.783287 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC9gQohV2v-7oj5HH3JgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:03:05.809568 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.243.203:39222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC-RePVOt35XCGZP8sAgAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:08.722255 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.243.203:39238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC_JqmL8PQht4WJFlDOQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:08.911133 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.241.46:38140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC_JDEJR9VXonE_-1KQgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:03:11.435366 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.243.203:39254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC_5DEJR9VXonE_-1KRQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:13.475774 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:51244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDABePVOt35XCGZP8sAwAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:14.789460 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:51258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDApqmL8PQht4WJFlDPAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:14.818815 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.244.31:56598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablDAnRXaaWotPICgYshdAAAA1g"]
[Tue Mar 17 09:03:16.039843 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:51266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDBBePVOt35XCGZP8sBAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:17.201892 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:51282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDBaBJNF7axNlVR0X5UAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:21.385565 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.243.203:51284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDCXRXaaWotPICgYshdwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:22.702727 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.243.203:37532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDChePVOt35XCGZP8sBwAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:23.871755 2026] [:error] [pid 7000:tid 140411607643904] [client 74.7.243.203:37548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDCxePVOt35XCGZP8sCAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:25.589677 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:37550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDDZDEJR9VXonE_-1KSQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:27.055560 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.228.16:59018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablDD1KJy4A1bGlmj9BSAQAAAk8"]
[Tue Mar 17 09:03:57.798647 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:37560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDLQeiSKl8TjouI-b-yQAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:00.191444 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:46962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDMJqmL8PQht4WJFlDegAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:04.488295 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.241.46:41656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDNAQohV2v-7oj5HH3XAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:07.984195 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.243.203:41362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDN3RXaaWotPICgYshkQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:09.779538 2026] [:error] [pid 1210:tid 140411557287680] [client 74.7.243.203:41372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDOVKJy4A1bGlmj9BSJQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:12.191459 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:58004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDPKBJNF7axNlVR0X5YQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:13.642629 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:58016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDPRePVOt35XCGZP8sFwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:15.793543 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:36434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDPweiSKl8TjouI-b-2AAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:17.892712 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:57182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDQQQohV2v-7oj5HH3XQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:17.894715 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:58020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDQRePVOt35XCGZP8sGwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:19.864076 2026] [:error] [pid 1961:tid 140411716749056] [client 74.7.241.46:55008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDQ3RXaaWotPICgYshmQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:20.709832 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:58036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDRHRXaaWotPICgYshnQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:21.159750 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:55018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDRaBJNF7axNlVR0X5ZAAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:21.979856 2026] [:error] [pid 1961:tid 140411708356352] [client 74.7.243.203:34938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDRXRXaaWotPICgYshogAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:25.446038 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:34940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDSe82sZHvlq4xgHq_jQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:28.062175 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:34946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDSpDEJR9VXonE_-1KVwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:29.353955 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:34948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDTQQohV2v-7oj5HH3YQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:30.525094 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:36154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDTgQohV2v-7oj5HH3YgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:31.819116 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:36168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDT-82sZHvlq4xgHq_jwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:35.071688 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:36180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDUweiSKl8TjouI-b-3gAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:39.747462 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.243.203:36188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDVxePVOt35XCGZP8sIgAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:41.107088 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:56644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDWaBJNF7axNlVR0X5bAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:42.373306 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.243.203:56652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDWlKJy4A1bGlmj9BSKQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:43.331128 2026] [:error] [pid 1961:tid 140411741927168] [client 74.7.241.46:55030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDW3RXaaWotPICgYsh9QAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:43.684959 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:56660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDW5DEJR9VXonE_-1KWwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:47.177397 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.243.203:56676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDXwQohV2v-7oj5HH3aQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:49.515190 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:56686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDYe82sZHvlq4xgHq_lAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:50.384228 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:39478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDYpDEJR9VXonE_-1KYQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:50.793803 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.243.203:41372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDYnRXaaWotPICgYsiDAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:54.535730 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:41374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDZpqmL8PQht4WJFlDsQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:55.813717 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.243.203:41376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDZ1KJy4A1bGlmj9BSLAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:57.174598 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDaaBJNF7axNlVR0X5cgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:58.472700 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:41398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDau82sZHvlq4xgHq_lgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:00.794619 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:41410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDbKBJNF7axNlVR0X5dQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:09.288568 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:53296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDdQeiSKl8TjouI-b-7gAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:10.749887 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:33376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDdnRXaaWotPICgYsiJAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:12.062678 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:36318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDeBePVOt35XCGZP8sKgAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:13.284347 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:36326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDeQQohV2v-7oj5HH3cAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:14.231035 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:43864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDehePVOt35XCGZP8sLAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:14.544831 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:36332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDegQohV2v-7oj5HH3cgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:15.741284 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:36336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDeweiSKl8TjouI-b-8AAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:17.053039 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.241.46:36346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDfVKJy4A1bGlmj9BSLgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:18.205428 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:43850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDfhePVOt35XCGZP8sLQAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:19.517289 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:43854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDf-82sZHvlq4xgHq_nAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:20.671355 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.241.46:43868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDgJqmL8PQht4WJFlDtQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:24.601279 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.241.46:43876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDglKJy4A1bGlmj9BSLwAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:26.017504 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:43884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDhgQohV2v-7oj5HH3dAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:27.179858 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.241.46:43886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDhwQohV2v-7oj5HH3dgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:28.464956 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:54382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDiNCmCSWTlPouqorHxwAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:29.656717 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:54392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDidCmCSWTlPouqorHyAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:30.941626 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.241.46:54408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDipqmL8PQht4WJFlDuAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:32.194997 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:54414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDjJqmL8PQht4WJFlDuQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:33.534716 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:54420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDjZqmL8PQht4WJFlDugAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:34.671346 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:54430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDju82sZHvlq4xgHq_nwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:35.960877 2026] [:error] [pid 7000:tid 140411658000128] [client 74.7.241.46:54446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDjxePVOt35XCGZP8sNAAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:37.173133 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:54458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDke82sZHvlq4xgHq_oAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:38.472734 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.241.46:44476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDkpDEJR9VXonE_-1KegAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:39.644825 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:44488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDk5DEJR9VXonE_-1KfgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:40.960601 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:44490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDlJDEJR9VXonE_-1KggAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:42.147458 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.241.46:44498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDlpDEJR9VXonE_-1KhAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:43.479906 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDlwQohV2v-7oj5HH3egAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:44.648492 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:44518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDmAQohV2v-7oj5HH3ewAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:44.794093 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:43880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDmAeiSKl8TjouI-b_CQAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:45.963195 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.241.46:44522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDmaBJNF7axNlVR0X5gwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:47.143159 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:44534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDm6BJNF7axNlVR0X5hwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:48.469701 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDnJDEJR9VXonE_-1KjQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:49.619139 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:60956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDnZDEJR9VXonE_-1KkAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:50.967697 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:60968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDngQohV2v-7oj5HH3fgAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:52.188626 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:60980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDoKBJNF7axNlVR0X5jQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:53.389682 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:60984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDoaBJNF7axNlVR0X5kAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:54.669116 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:60992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDopqmL8PQht4WJFlDvAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:55.841015 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:32768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDo5qmL8PQht4WJFlDvQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:57.179024 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:32776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDpe82sZHvlq4xgHq_ogAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:58.350101 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:49094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDptCmCSWTlPouqorHygAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:59.610233 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:49098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDp1KJy4A1bGlmj9BSOAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:00.809254 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:49112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDqO82sZHvlq4xgHq_owAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:02.230406 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:49114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDqu82sZHvlq4xgHq_pAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:03.369690 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:49124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDqweiSKl8TjouI-b_CwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:04.375096 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:50476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDrKBJNF7axNlVR0X5oAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:04.682010 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.241.46:49130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDrFKJy4A1bGlmj9BSOgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:05.853662 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.241.46:49132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDrZDEJR9VXonE_-1KpgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:07.189006 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:49140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDr-82sZHvlq4xgHq_pQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:08.401794 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.241.46:40276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDsJqmL8PQht4WJFlDwAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:09.687678 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:40280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDsZDEJR9VXonE_-1KsAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:10.908984 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.241.46:40292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDstCmCSWTlPouqorHzAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:12.241647 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:40302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDtNCmCSWTlPouqorHzQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:13.387423 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.241.46:40306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDtVKJy4A1bGlmj9BSOwAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:14.759352 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.241.46:40316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDtu82sZHvlq4xgHq_pgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:17.064393 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.46:40324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDuQeiSKl8TjouI-b_DQAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:19.795375 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.241.46:36756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDulKJy4A1bGlmj9BSPAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:21.096983 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:36768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDvdCmCSWTlPouqorH0QAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:22.258774 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:36778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDvqBJNF7axNlVR0X5pgAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:23.575252 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:36780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDv9CmCSWTlPouqorH0gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:26.847462 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDwlKJy4A1bGlmj9BSPwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:30.187178 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.241.46:50090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDxgQohV2v-7oj5HH3hwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:31.566718 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDxxePVOt35XCGZP8sPQAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:33.806574 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:36758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDyZDEJR9VXonE_-1K3AAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:36.143025 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:57762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDzJDEJR9VXonE_-1K3wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:37.398472 2026] [:error] [pid 1961:tid 140411599251200] [client 74.7.241.46:50114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDzXRXaaWotPICgYsiLwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:39.978204 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.241.46:49644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDz9CmCSWTlPouqorH1wAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:41.791756 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD0QeiSKl8TjouI-b_FQAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:44.791402 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:49650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD1FKJy4A1bGlmj9BSSAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:48.699415 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:49652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD2O82sZHvlq4xgHq_rgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:55.567357 2026] [:error] [pid 7000:tid 140411540502272] [client 74.7.241.46:52474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD3xePVOt35XCGZP8sRgAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:56.863052 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:52480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD4HRXaaWotPICgYsiNQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:58.139040 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:36320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD4pDEJR9VXonE_-1LBgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:59.429151 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:36334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD4weiSKl8TjouI-b_GAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:00.754187 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:36350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD5KBJNF7axNlVR0X5rwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:02.294713 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:36354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD5tCmCSWTlPouqorH3AAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:03.666373 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.241.46:36360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD55qmL8PQht4WJFlD8gAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:17.980070 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD9RePVOt35XCGZP8sVwAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:19.383118 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:55144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD96BJNF7axNlVR0X5swAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:20.611395 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:55156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD-NCmCSWTlPouqorH4gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:21.933526 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:55166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD-QQohV2v-7oj5HH3lAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:23.158808 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:55168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD-5DEJR9VXonE_-1LPAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:24.475153 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:55184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD_AeiSKl8TjouI-b_IAAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:25.671094 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:55198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD_QQohV2v-7oj5HH3lwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:26.999342 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:55208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD_hePVOt35XCGZP8sWQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:28.179574 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:51732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEAFKJy4A1bGlmj9BSUAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:30.035381 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:51740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEAXRXaaWotPICgYsiOgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:31.451157 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:51746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEA6BJNF7axNlVR0X5uQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:32.955085 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:51756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEBKBJNF7axNlVR0X5vwAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:34.574154 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEBqBJNF7axNlVR0X5wAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:35.281884 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.243.203:46782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEB5DEJR9VXonE_-1LTQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:35.833882 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:51772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEB6BJNF7axNlVR0X5xQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:38.083895 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:51782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablECaBJNF7axNlVR0X5xwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:39.503287 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:37394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEC6BJNF7axNlVR0X5yQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:40.873856 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:37398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEDAQohV2v-7oj5HH3nwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:42.017836 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.46:37402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEDgeiSKl8TjouI-b_KwAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:43.360697 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:37404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablED3RXaaWotPICgYsiPwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:44.735814 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.241.46:37408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEEFKJy4A1bGlmj9BSVQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:45.887441 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:37412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEEaBJNF7axNlVR0X50AAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:47.227190 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.241.46:37424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEE5DEJR9VXonE_-1LTwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:48.459507 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.46:35866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEFKBJNF7axNlVR0X50wAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:49.868248 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:35880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEFaBJNF7axNlVR0X51gAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:51.151486 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.241.46:35886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEF1KJy4A1bGlmj9BSWwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:52.623283 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:35892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEGBePVOt35XCGZP8sdgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:53.799144 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.241.46:35902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEGVKJy4A1bGlmj9BSXAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:55.102977 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:35916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEG9CmCSWTlPouqorH7gAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:56.319515 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:35928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEHJDEJR9VXonE_-1LVgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:58.098953 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:47834] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEHtCmCSWTlPouqorH8QAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:59.359161 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.241.46:47844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEH5DEJR9VXonE_-1LWgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:00.655041 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:47860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEINCmCSWTlPouqorH8gAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:03.399125 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.241.46:47870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEI3RXaaWotPICgYsiQQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:04.681858 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEJHRXaaWotPICgYsiQgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:05.902204 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:47900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEJaBJNF7axNlVR0X55QAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:07.251646 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:47910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEJ9CmCSWTlPouqorH9gAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:08.445221 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.241.46:58184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEKO82sZHvlq4xgHq_wwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:09.768515 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:58190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEKQQohV2v-7oj5HH3oQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:10.991072 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:58206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEKhePVOt35XCGZP8sjwAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:12.741236 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:58210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablELO82sZHvlq4xgHq_xQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:14.053271 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.241.46:58212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablELlKJy4A1bGlmj9BSYgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:15.260493 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:58226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEL9CmCSWTlPouqorH-gAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:15.450836 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.244.31:46086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablELwQohV2v-7oj5HH3owAAAYU"]
[Tue Mar 17 09:08:16.576004 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:58230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEMNCmCSWTlPouqorH-wAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:17.754740 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:58234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEMZDEJR9VXonE_-1LaQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:19.098982 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:38662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEM5DEJR9VXonE_-1LawAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:20.259097 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:38674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablENAQohV2v-7oj5HH3pQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:21.589041 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:38678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablENe82sZHvlq4xgHq_yQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:22.921366 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.241.46:38688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablENu82sZHvlq4xgHq_ygAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:24.248150 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:38696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEONCmCSWTlPouqorH_wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:25.771389 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:38708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEOdCmCSWTlPouqorIAwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:27.103144 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.241.46:38714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEO5qmL8PQht4WJFlEYwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:27.226844 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.228.16:43626] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablEO5qmL8PQht4WJFlEZAAAAUY"]
[Tue Mar 17 09:08:28.302893 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.241.46:36206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEPFKJy4A1bGlmj9BSZgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:29.588695 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:36208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEPZDEJR9VXonE_-1LfAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:30.856545 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:36216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEPhePVOt35XCGZP8sowAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:32.241551 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:36222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEQO82sZHvlq4xgHq_0AAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:33.509427 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:36224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEQQeiSKl8TjouI-b_OgAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:34.798521 2026] [:error] [pid 7000:tid 140411658000128] [client 74.7.241.46:36234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEQhePVOt35XCGZP8sqAAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:37.126695 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.241.46:36240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablERZDEJR9VXonE_-1LggAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:37.958961 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:60308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablERRePVOt35XCGZP8sqwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:39.555196 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:60862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablERwQohV2v-7oj5HH3qgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:40.705547 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.46:60872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablESAeiSKl8TjouI-b_PwAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:41.582649 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.243.203:47516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablESXRXaaWotPICgYsiTwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:43.155144 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.241.46:60876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablESweiSKl8TjouI-b_QwAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:44.555234 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:60882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablETKBJNF7axNlVR0X59AAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:08:48.192339 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:60894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEUAQohV2v-7oj5HH3rgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:56.852272 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:47902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEWJDEJR9VXonE_-1LmQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:59.073419 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.241.46:40998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEWlKJy4A1bGlmj9BScgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:09:02.776617 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:41012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEXtCmCSWTlPouqorIEgAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:07.431760 2026] [:error] [pid 1961:tid 140411658000128] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEY3RXaaWotPICgYsiYwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:08.727198 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:50914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEZBePVOt35XCGZP8svwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:09:10.979207 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:50924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEZqBJNF7axNlVR0X5_QAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:12.566990 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:53142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEaAeiSKl8TjouI-b_XQAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:13.937988 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:40728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEaZDEJR9VXonE_-1LoAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:22.793601 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.243.203:40730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEcnRXaaWotPICgYsieAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:23.239672 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:50936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEc-82sZHvlq4xgHq_7wAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:25.207307 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.243.203:47080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEdRePVOt35XCGZP8swwAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:28.678823 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.243.203:47084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEeBePVOt35XCGZP8sxwAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:30.161966 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:56314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEegeiSKl8TjouI-b_YAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:31.311947 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:56324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEe9CmCSWTlPouqorIHgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:32.607033 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:56328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEfJqmL8PQht4WJFlEnQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:35.978727 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.243.203:56342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEf1KJy4A1bGlmj9BSgAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:37.360980 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.243.203:56356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEgVKJy4A1bGlmj9BSgQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:39.203741 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:56368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEggeiSKl8TjouI-b_YwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:40.690870 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:57464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEhKBJNF7axNlVR0X6BQAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:45.251303 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:57472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEidCmCSWTlPouqorIKQAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:46.547437 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:57486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEigeiSKl8TjouI-b_ZQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:50.807808 2026] [:error] [pid 7000:tid 140411565680384] [client 74.7.243.203:57494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEjRePVOt35XCGZP8s0wAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:52.331209 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:36668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEkFKJy4A1bGlmj9BSiQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:53.515718 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEkQeiSKl8TjouI-b_ZwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:55.918622 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEk-82sZHvlq4xgHq_9gAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:57.238777 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.243.203:36694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEle82sZHvlq4xgHq_-QAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:10:05.463729 2026] [:error] [pid 1210:tid 140411557287680] [client 74.7.243.203:36710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEnVKJy4A1bGlmj9BSlAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:10:09.469650 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:40346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEoaBJNF7axNlVR0X6EwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:10:10.802887 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:45500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEou82sZHvlq4xgHrACAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:11:21.507439 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:57600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablE6QQohV2v-7oj5HH4NgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:11:33.551688 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:48484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablE9XRXaaWotPICgYsiqQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:11:44.654826 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:34808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFABePVOt35XCGZP8tBAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:11:53.313169 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:34820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFCQeiSKl8TjouI-b_sgAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:01.198055 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.243.203:46762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFEZDEJR9VXonE_-1L9QAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:09.414470 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.243.203:52674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFGVKJy4A1bGlmj9BSwQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:12:10.276170 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.241.46:52636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFGhePVOt35XCGZP8tJgAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:11.543409 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:51706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFG3RXaaWotPICgYsiswAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:12.124903 2026] [:error] [pid 1961:tid 140411548894976] [client 74.7.243.203:50030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHHRXaaWotPICgYsitAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:12.661839 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:51720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHBePVOt35XCGZP8tJwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:13.480448 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.243.203:50032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHZDEJR9VXonE_-1L_QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:13.999495 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:51724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHQeiSKl8TjouI-b_vAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:15.159279 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:51736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHweiSKl8TjouI-b_xwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:16.527327 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:51744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFIKBJNF7axNlVR0X6QwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:17.747070 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFIXRXaaWotPICgYsitgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:18.407489 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:50044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFIgeiSKl8TjouI-b_0QAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:12:21.414954 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:50484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFJZqmL8PQht4WJFlFHgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:22.168656 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:50060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFJpDEJR9VXonE_-1MAgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:12:26.569956 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:50500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFKhePVOt35XCGZP8tNgAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:27.842957 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.241.46:50502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFKxePVOt35XCGZP8tOgAAA4E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:29.087190 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.46:45030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFLQeiSKl8TjouI-b_3AAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:30.464293 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:45042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFLu82sZHvlq4xgHrAOgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:31.679519 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:45044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFL-82sZHvlq4xgHrAPAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:33.093674 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.241.46:45060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFMdCmCSWTlPouqorIcgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:36.388507 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:45068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFNBePVOt35XCGZP8tQwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:37.811390 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:45078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFNe82sZHvlq4xgHrAPgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:40.288140 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:37504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFOO82sZHvlq4xgHrARQAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:46.354753 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:37518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFPqBJNF7axNlVR0X6VQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:49.753636 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:37522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFQZDEJR9VXonE_-1MMgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:54.183321 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:37878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFRgQohV2v-7oj5HH4WQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:01.624215 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:37880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFTZDEJR9VXonE_-1MSQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:04.083431 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:60328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFUKBJNF7axNlVR0X6XAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:06.514535 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:60336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFUu82sZHvlq4xgHrATAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:12.891114 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:60348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFWNCmCSWTlPouqorIgAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:15.771139 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.244.31:36618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablFW6BJNF7axNlVR0X6XQAAAAk"]
[Tue Mar 17 09:13:39.736654 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:60410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFc-82sZHvlq4xgHrAUQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:49.371484 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:33568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFfZDEJR9VXonE_-1MfQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:13:50.099725 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.228.16:40414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablFfgeiSKl8TjouI-YALQAAA8Y"]
[Tue Mar 17 09:14:06.764523 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:58354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFjnRXaaWotPICgYsi6wAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:14:08.124773 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:46028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFkAeiSKl8TjouI-YAPgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:14:12.287109 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:40308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFlNCmCSWTlPouqorIsQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:14:13.853599 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:46040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFlXRXaaWotPICgYsi8QAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:19.808015 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.243.203:59902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF1nRXaaWotPICgYsjQgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:15:24.511705 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:40868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF3NCmCSWTlPouqorJCQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:25.903561 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:32826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF3e82sZHvlq4xgHrAigAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:27.226426 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:32842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF39CmCSWTlPouqorJCgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:29.855907 2026] [:error] [pid 7000:tid 140411691570944] [client 74.7.241.46:53272] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF4RePVOt35XCGZP8tlQAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:32.364991 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:53286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF5JDEJR9VXonE_-1MtAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:40.979449 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:53288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF7BePVOt35XCGZP8towAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:42.050884 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.243.203:52590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF7lKJy4A1bGlmj9BTHgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:15:45.837298 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.243.203:52560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF8XRXaaWotPICgYsjUQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:46.151386 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:56274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF8pDEJR9VXonE_-1MwQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:47.539181 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:56286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF81KJy4A1bGlmj9BTIgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:56.440162 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:52564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF-6BJNF7axNlVR0X6sgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:16:00.571979 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:54326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGAO82sZHvlq4xgHrAnQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:16:20.199250 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:43228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGFO82sZHvlq4xgHrArQAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:16:24.685361 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.243.203:36452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGGBePVOt35XCGZP8txQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:16:40.699986 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.243.203:36468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGKJDEJR9VXonE_-1M9wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:16:42.047443 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.243.203:59678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGKu82sZHvlq4xgHrAvQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:16:45.715298 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:59694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGLKBJNF7axNlVR0X62gAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:17:28.139436 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:59706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGWO82sZHvlq4xgHrA7AAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:33.958504 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:42484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGXaBJNF7axNlVR0X7BQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:36.486112 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.243.203:42054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGYFKJy4A1bGlmj9BTbAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:42.162334 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:42070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGZpqmL8PQht4WJFlF9wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:17:52.451250 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:50760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGcJqmL8PQht4WJFlGAQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:57.211505 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGdQeiSKl8TjouI-YA2AAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:18:02.475645 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.241.46:53588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGenRXaaWotPICgYsjrgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:18:05.185662 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:53600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGfdCmCSWTlPouqorJegAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:18:13.163412 2026] [:error] [pid 2305:tid 140411691570944] [client 74.7.241.46:53612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGhAQohV2v-7oj5HH5aAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:18:16.672263 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.244.31:56484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablGh6BJNF7axNlVR0X7FAAAABQ"]
[Tue Mar 17 09:18:48.547553 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:34810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGqNCmCSWTlPouqorJuQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:18:51.863904 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:45416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablGq6BJNF7axNlVR0X7MwAAAAc"]
[Tue Mar 17 09:19:13.020397 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:57984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGwXRXaaWotPICgYsj6gAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:14.382786 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.46:60734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGwtCmCSWTlPouqorJzwAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:16.732649 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:60742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGxO82sZHvlq4xgHrBMgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:19.360692 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:40464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGxxePVOt35XCGZP8uHwAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:21.827494 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:40474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGye82sZHvlq4xgHrBOAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:23.145545 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:40478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGy1KJy4A1bGlmj9BTygAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:24.387105 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:40484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGzJDEJR9VXonE_-1NmwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:28.038935 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:40490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG0AQohV2v-7oj5HH5yQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:29.364728 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.241.46:34566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG0VKJy4A1bGlmj9BT0QAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:30.558289 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.241.46:34572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG0hePVOt35XCGZP8uKgAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:31.842780 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG05DEJR9VXonE_-1NpAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:32.111138 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG1JDEJR9VXonE_-1NpQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:36.712038 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.241.46:34598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG2FKJy4A1bGlmj9BT2AAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:39.376007 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:34600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG2xePVOt35XCGZP8uMgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:40.772638 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:39846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG3JDEJR9VXonE_-1NrQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:43.335292 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:39862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG3weiSKl8TjouI-YBDwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:44.695355 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:39866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG4BePVOt35XCGZP8uMwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:47.652517 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:39868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG46BJNF7axNlVR0X7VwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:50.263124 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:34458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG5lKJy4A1bGlmj9BT5gAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:53.774487 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.241.46:34470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG55qmL8PQht4WJFlGXAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:56.067280 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7NCmCSWTlPouqorKEgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:56.247515 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:34486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7BePVOt35XCGZP8uPwAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:57.703511 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.241.46:34494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7XRXaaWotPICgYskFgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:59.003519 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:43552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7wQohV2v-7oj5HH56wAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:03.430458 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:43556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG8NCmCSWTlPouqorKFQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:07.751601 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.241.46:43568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG91KJy4A1bGlmj9BT-AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:10.390709 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:48760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG-QQohV2v-7oj5HH59AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:16.513515 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHABePVOt35XCGZP8uUQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:17.799393 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHAVKJy4A1bGlmj9BT_wAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:20.155740 2026] [:error] [pid 1926:tid 140411649607424] [client 74.7.241.46:54498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHBA1iGVhhz8eUyH7ihAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:24.841533 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:54512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHCFKJy4A1bGlmj9BUCwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:27.345852 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.241.46:54518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHCwb2qCuy5irgBMjIKQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:28.711126 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:45146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHDBePVOt35XCGZP8uWwAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:29.978561 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:45154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHDaBJNF7axNlVR0X7cwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:31.287019 2026] [:error] [pid 1731:tid 140411599251200] [client 74.7.241.46:45170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHDwb2qCuy5irgBMjILAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:34.775159 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:45178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHEgQohV2v-7oj5HH6DQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:36.115749 2026] [:error] [pid 2272:tid 140411666392832] [client 74.7.241.46:45190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHFOqR4k58SHWDy7tbowAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:37.330216 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:45198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHFZqmL8PQht4WJFlGhwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:50.522835 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHIhePVOt35XCGZP8ubgAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:20:54.559675 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:49678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHJnRXaaWotPICgYskUQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:14.242773 2026] [:error] [pid 2553:tid 140411548894976] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHOv0Bec_B9OkZP_i75wAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:27.774754 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:52066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHR6BJNF7axNlVR0X7jQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:32.909590 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:33880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHTNCmCSWTlPouqorKPAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:34.367523 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:33882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHTnRXaaWotPICgYskYgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:21:35.465602 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.243.203:38552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHT3RXaaWotPICgYskYwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:21:35.926546 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.241.46:33888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHTwQohV2v-7oj5HH6IQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:21:40.543369 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:38568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHVJDEJR9VXonE_-1N3gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:21:44.272210 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:53014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHWKBJNF7axNlVR0X7kgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:21:49.765113 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.243.203:53030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHXVKJy4A1bGlmj9BUJQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:22:07.055002 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:58114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHb5DEJR9VXonE_-1N8QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:22:07.095678 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:55894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHbweiSKl8TjouI-YBUQAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:22:48.794146 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.243.203:50610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHmAQohV2v-7oj5HH6PQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:22:50.000237 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:39506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHme82sZHvlq4xgHrBlwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:22:52.006443 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.241.46:53756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHnNCmCSWTlPouqorKWwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:01.863480 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.243.203:50618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHpVKJy4A1bGlmj9BUWgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:23:02.736615 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:36904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHphePVOt35XCGZP8ulQAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:23:07.018488 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:58872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHq3RXaaWotPICgYskhgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:23:17.504662 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.244.31:41970] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablHtZqmL8PQht4WJFlGvgAAAVc"]
[Tue Mar 17 09:23:26.258040 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:54612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHvqBJNF7axNlVR0X7xwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:32.883512 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:40632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHxKBJNF7axNlVR0X7zAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:23:34.219055 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:33892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHxtCmCSWTlPouqorKZAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:23:40.440709 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.241.46:33900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHzAb2qCuy5irgBMjIcgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:46.111030 2026] [:error] [pid 1926:tid 140411691570944] [client 74.7.243.203:58874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablH0g1iGVhhz8eUyH7i2QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:53.039746 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.228.16:60428] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablH2f0Bec_B9OkZP_i7-wAAAsY"]
[Tue Mar 17 09:24:16.607527 2026] [:error] [pid 2553:tid 140411641214720] [client 74.7.241.46:33808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablH8P0Bec_B9OkZP_i8AwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:24:20.812628 2026] [:error] [pid 1926:tid 140411616036608] [client 74.7.241.46:39396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablH9A1iGVhhz8eUyH7i4gAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:24:56.527406 2026] [:error] [pid 2553:tid 140411716749056] [client 74.7.241.46:39402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIGP0Bec_B9OkZP_i8JAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:01.999804 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:52684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIHQQohV2v-7oj5HH6XAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:05.431693 2026] [:error] [pid 2659:tid 140411540502272] [client 74.7.241.46:48588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIIUTmPU-2Y17BMWW0RgAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:06.815157 2026] [:error] [pid 2659:tid 140411632822016] [client 74.7.241.46:48594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIIkTmPU-2Y17BMWW0RwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:08.135269 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:47482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIJO82sZHvlq4xgHrBpQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:09.612587 2026] [:error] [pid 2659:tid 140411649607424] [client 74.7.241.46:47490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIJUTmPU-2Y17BMWW0SgAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:10.955366 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:47494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIJpDEJR9VXonE_-1ONQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:13.494184 2026] [:error] [pid 2553:tid 140411557287680] [client 74.7.241.46:47510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIKP0Bec_B9OkZP_i8KQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:13.494197 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.243.203:46208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIKHRXaaWotPICgYsk2QAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:25:15.302372 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:47518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIK-82sZHvlq4xgHrBqQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:17.839097 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:47528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablILVKJy4A1bGlmj9BUzAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:19.263277 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:37506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIL5DEJR9VXonE_-1ONwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:20.777488 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:37514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIMFKJy4A1bGlmj9BU0AAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:22.208999 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:39210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIMv0Bec_B9OkZP_i8LwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:22.261969 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.46:37516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIMgeiSKl8TjouI-YBigAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:26.328218 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:37532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablINnRXaaWotPICgYsk3AAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:27.837102 2026] [:error] [pid 2159:tid 140411582465792] [client 74.7.241.46:37534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIN_ct6CQ8jnRyg2p7dgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:31.499868 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:55914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIO3RXaaWotPICgYsk5AAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:32.947002 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.46:55922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIPAeiSKl8TjouI-YBkQAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:40.082070 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:55936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIRAeiSKl8TjouI-YBmQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:47.275486 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:54156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablISwQohV2v-7oj5HH6YgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:48.775497 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:42348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablITJqmL8PQht4WJFlG8gAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:12.352716 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:42358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIY5DEJR9VXonE_-1OXAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:13.685330 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:54936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIZaBJNF7axNlVR0X77wAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:15.919744 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:54942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIZ9CmCSWTlPouqorKkgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:22.247074 2026] [:error] [pid 2553:tid 140411649607424] [client 74.7.241.46:54954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIbv0Bec_B9OkZP_i8RAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:23.592722 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:46234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIb5DEJR9VXonE_-1OZQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:27.206111 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.46:46250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIc6BJNF7axNlVR0X7-QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:29.770923 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:58780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIdZqmL8PQht4WJFlHHwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:26:32.721754 2026] [:error] [pid 1731:tid 140411582465792] [client 74.7.241.46:35748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIeAb2qCuy5irgBMjInwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:34.525987 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:42828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIepDEJR9VXonE_-1ObQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:26:37.318844 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.241.46:35762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIfP0Bec_B9OkZP_i8SAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:43.246879 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.241.46:57360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIg5qmL8PQht4WJFlHJQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:46.659588 2026] [:error] [pid 2553:tid 140411725141760] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIhv0Bec_B9OkZP_i8SwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:55.084506 2026] [:error] [pid 2159:tid 140411641214720] [client 74.7.243.203:42836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIj_ct6CQ8jnRyg2p7oAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:26:56.374898 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:42486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIkKBJNF7axNlVR0X8AQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:57.719554 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:42496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIkQeiSKl8TjouI-YBtwAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:27:05.037131 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.241.46:57380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablImQb2qCuy5irgBMjIsAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:26.106119 2026] [:error] [pid 2159:tid 140411708356352] [client 74.7.241.46:38010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIrvct6CQ8jnRyg2p7ugAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:27.929666 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.241.46:53562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIr5qmL8PQht4WJFlHNAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:31.358733 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.46:38334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIs6BJNF7axNlVR0X8DgAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:39.312700 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:38340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIu5qmL8PQht4WJFlHPQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:40.675085 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:35584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIvAeiSKl8TjouI-YByQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:55.148186 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.241.46:35592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIy_ct6CQ8jnRyg2p7zQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:27:57.666810 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.241.46:52900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIzQb2qCuy5irgBMjIywAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:04.327138 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:42506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI1O82sZHvlq4xgHrCEwAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:17.508081 2026] [:error] [pid 2553:tid 140411658000128] [client 74.7.244.31:41956] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablI4f0Bec_B9OkZP_i8egAAAso"]
[Tue Mar 17 09:28:19.276606 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:49128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI45qmL8PQht4WJFlHYAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:28:21.755062 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:38478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI5ZDEJR9VXonE_-1OmAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:28:26.304240 2026] [:error] [pid 2553:tid 140411666392832] [client 74.7.241.46:38482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI6v0Bec_B9OkZP_i8hwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:35.318912 2026] [:error] [pid 2553:tid 140411725141760] [client 74.7.241.46:38482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI8_0Bec_B9OkZP_i8mAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:36.659339 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:34696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI9AeiSKl8TjouI-YB4gAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:28:37.965213 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:34708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI9ZDEJR9VXonE_-1OmQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:43.288519 2026] [:error] [pid 2553:tid 140411557287680] [client 74.7.243.203:60728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI-_0Bec_B9OkZP_i8ngAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:28:47.037956 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:50896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI_weiSKl8TjouI-YB5wAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:28:53.844366 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.228.16:40638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablJBdCmCSWTlPouqorLIwAAAMM"]
[Tue Mar 17 09:29:48.319023 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:53314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJPJqmL8PQht4WJFlHswAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:29:54.714894 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.243.203:50902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJQtCmCSWTlPouqorLoQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:30:04.061662 2026] [:error] [pid 1731:tid 140411607643904] [client 74.7.241.46:57394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJTAb2qCuy5irgBMjJDAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:05.714908 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJTZqmL8PQht4WJFlHuQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:08.300326 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:58194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJUAeiSKl8TjouI-YCCwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:19.619613 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:57400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJW6BJNF7axNlVR0X8UgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:32.743246 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJaJDEJR9VXonE_-1O2QAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:34.089029 2026] [:error] [pid 2159:tid 140411666392832] [client 74.7.241.46:43652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJavct6CQ8jnRyg2p8CgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:35.413910 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:43660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJa5DEJR9VXonE_-1O2wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:36.788196 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.241.46:43668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJbFKJy4A1bGlmj9BVlgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:43.555635 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:43680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJcweiSKl8TjouI-YCLAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:44.863503 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:54602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJdNCmCSWTlPouqorL2QAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:46.190254 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:54612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJdu82sZHvlq4xgHrCVQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:48.531173 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:54622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJeNCmCSWTlPouqorL3QAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:50.987725 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.241.46:39584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJeu82sZHvlq4xgHrCWgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:53.414505 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:39596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJfaBJNF7axNlVR0X8XQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:54.757650 2026] [:error] [pid 2553:tid 140411616036608] [client 74.7.241.46:39608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJfv0Bec_B9OkZP_i8-AAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:56.090160 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:39624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJgO82sZHvlq4xgHrCWwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:57.423151 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.241.46:39636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJgf0Bec_B9OkZP_i8_gAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:01.914206 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.241.46:56532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJhAb2qCuy5irgBMjJIwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:03.279010 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:56554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJh-82sZHvlq4xgHrCXgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:04.625828 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.241.46:56558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJiNCmCSWTlPouqorL5gAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:05.855634 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:56564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJiVKJy4A1bGlmj9BVpQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:07.171382 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:56574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJi5DEJR9VXonE_-1O7AAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:08.783385 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.243.203:36084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJjP0Bec_B9OkZP_i9BwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:09.517507 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:38664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJjZDEJR9VXonE_-1O8QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:10.109685 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:45624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJjgeiSKl8TjouI-YCNwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:11.442084 2026] [:error] [pid 2159:tid 140411733534464] [client 74.7.243.203:46670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJj_ct6CQ8jnRyg2p8IwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:11.871105 2026] [:error] [pid 2159:tid 140411741927168] [client 74.7.241.46:38684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJj_ct6CQ8jnRyg2p8JgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:12.799709 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:46684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkNCmCSWTlPouqorL6gAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:13.215745 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.46:38692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkaBJNF7axNlVR0X8ZQAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:14.137242 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:46686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkpqmL8PQht4WJFlH0QAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:14.526689 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:38692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkqBJNF7axNlVR0X8aAAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:15.461826 2026] [:error] [pid 1731:tid 140411607643904] [client 74.7.243.203:46690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkwb2qCuy5irgBMjJJgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:15.918050 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.241.46:38704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkwb2qCuy5irgBMjJJwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:17.908434 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:46700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJlZqmL8PQht4WJFlH0wAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:19.224496 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:46704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJl9CmCSWTlPouqorL7AAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:19.434660 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:38718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJl-82sZHvlq4xgHrCaAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:20.539041 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:36054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJmNCmCSWTlPouqorL7gAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:22.887456 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.243.203:36062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJmlKJy4A1bGlmj9BVrQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:24.221662 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:36072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnAeiSKl8TjouI-YCPgAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:24.964339 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:33900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnNCmCSWTlPouqorL8wAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:25.428834 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.243.203:36074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnZDEJR9VXonE_-1O8wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:26.261457 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:33912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnqBJNF7axNlVR0X8bwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:26.741637 2026] [:error] [pid 2553:tid 140411733534464] [client 74.7.243.203:36090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnv0Bec_B9OkZP_i9EAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:27.529873 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:33920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJn6BJNF7axNlVR0X8cQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:28.035724 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJoJqmL8PQht4WJFlH2wAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:29.315064 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:36116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJoZqmL8PQht4WJFlH3gAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:30.618269 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.243.203:54704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJopDEJR9VXonE_-1O9AAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:31.952969 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:54714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJowb2qCuy5irgBMjJLAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:32.200270 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:46092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpJqmL8PQht4WJFlH4wAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:33.443136 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.241.46:46100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpVKJy4A1bGlmj9BVsAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:34.326218 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.243.203:54730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpv0Bec_B9OkZP_i9FAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:34.783651 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.241.46:46104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpgb2qCuy5irgBMjJLQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:37.882611 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:54746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJqQb2qCuy5irgBMjJLwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:39.170647 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:54748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJq5DEJR9VXonE_-1O-AAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:41.410070 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:46112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJrNCmCSWTlPouqorL-AAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:41.411264 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:51082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJrJDEJR9VXonE_-1O-gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:42.799278 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:51086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJru82sZHvlq4xgHrCcAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:42.869465 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.241.46:35418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJrpqmL8PQht4WJFlH5QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:44.133604 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:51092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsO82sZHvlq4xgHrCcgAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:44.186484 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsO82sZHvlq4xgHrCcwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:45.572236 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:35432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsZDEJR9VXonE_-1PAQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:46.591329 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:51104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsgb2qCuy5irgBMjJMwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:46.900393 2026] [:error] [pid 2553:tid 140411674785536] [client 74.7.241.46:35444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsv0Bec_B9OkZP_i9FwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:47.919328 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:51110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsweiSKl8TjouI-YCRQAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:48.275881 2026] [:error] [pid 1731:tid 140411540502272] [client 74.7.241.46:40808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtAb2qCuy5irgBMjJNAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:49.498718 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.243.203:51122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtZDEJR9VXonE_-1PBQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:49.627712 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtdCmCSWTlPouqorL_QAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:50.803018 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:39590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtqBJNF7axNlVR0X8egAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:50.909819 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:40834] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJttCmCSWTlPouqorMAAAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:52.270913 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJuAeiSKl8TjouI-YCRwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:53.176940 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.243.203:39596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJuVKJy4A1bGlmj9BVuAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:54.505431 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:39606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJutCmCSWTlPouqorMBQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:55.801597 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJu6BJNF7axNlVR0X8fQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:55.886546 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.241.46:40852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJu9CmCSWTlPouqorMBwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:57.096991 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:39612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvdCmCSWTlPouqorMCAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:57.177031 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:40864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvdCmCSWTlPouqorMCQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:58.339720 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:47254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvu82sZHvlq4xgHrCdwAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:58.427023 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:39620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvqBJNF7axNlVR0X8fwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:59.608909 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:47264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJv1KJy4A1bGlmj9BVugAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:59.721565 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:39630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvweiSKl8TjouI-YCSgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:00.808042 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.241.46:47266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwAb2qCuy5irgBMjJNQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:00.993801 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:36640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwAb2qCuy5irgBMjJNgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:02.589400 2026] [:error] [pid 2553:tid 140411666392832] [client 74.7.241.46:47270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwv0Bec_B9OkZP_i9HgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:02.647446 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:36652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwlKJy4A1bGlmj9BVvAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:04.041600 2026] [:error] [pid 2553:tid 140411565680384] [client 74.7.243.203:36656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxP0Bec_B9OkZP_i9HwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:04.866846 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.241.46:47280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxAb2qCuy5irgBMjJOgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:05.475413 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:36660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxaBJNF7axNlVR0X8hwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:06.210621 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:47294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxpDEJR9VXonE_-1PBgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:06.831135 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:36666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxu82sZHvlq4xgHrCewAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:07.431981 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:47296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJx5qmL8PQht4WJFlH7gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:07.973526 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxweiSKl8TjouI-YCSwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:10.003802 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:48956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJyJDEJR9VXonE_-1PCAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:10.003972 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJyZqmL8PQht4WJFlH7wAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:11.374022 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:57938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJyweiSKl8TjouI-YCTAAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:12.460611 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:48960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzO82sZHvlq4xgHrCfwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:12.596955 2026] [:error] [pid 2159:tid 140411599251200] [client 74.7.243.203:57942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzPct6CQ8jnRyg2p8XAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:13.790564 2026] [:error] [pid 2553:tid 140411616036608] [client 74.7.241.46:48968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzf0Bec_B9OkZP_i9IwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:13.902888 2026] [:error] [pid 2159:tid 140411590858496] [client 74.7.243.203:57958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzfct6CQ8jnRyg2p8XgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:14.998569 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.241.46:48976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzpDEJR9VXonE_-1PCQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:15.241231 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJz5qmL8PQht4WJFlH8gAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:16.480727 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:57976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ0AeiSKl8TjouI-YCTgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:17.806030 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:57988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ0dCmCSWTlPouqorMDAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:18.372558 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:48992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ0geiSKl8TjouI-YCUAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:20.279164 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:58002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1JDEJR9VXonE_-1PDQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:20.739951 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:60568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1JDEJR9VXonE_-1PDgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:22.024992 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:60584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1tCmCSWTlPouqorMDQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:22.639141 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:56612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1geiSKl8TjouI-YCUwAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:23.217836 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:60598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ16BJNF7axNlVR0X8jQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:23.910631 2026] [:error] [pid 2553:tid 140411590858496] [client 74.7.243.203:56616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1_0Bec_B9OkZP_i9JQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:25.081165 2026] [:error] [pid 2553:tid 140411607643904] [client 74.7.243.203:56618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ2f0Bec_B9OkZP_i9JwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:26.396009 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:56624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ2tCmCSWTlPouqorMDgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:26.639769 2026] [:error] [pid 2553:tid 140411632822016] [client 74.7.241.46:60608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ2v0Bec_B9OkZP_i9KgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:27.553950 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:56634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ29CmCSWTlPouqorMEAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:28.010998 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.46:60622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3AeiSKl8TjouI-YCVAAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:28.837880 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:56644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3O82sZHvlq4xgHrCggAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:29.208087 2026] [:error] [pid 1731:tid 140411599251200] [client 74.7.241.46:33568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3Qb2qCuy5irgBMjJQgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:30.185208 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.243.203:44868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3lKJy4A1bGlmj9BVxQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:31.443060 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:44880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3-82sZHvlq4xgHrChAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:31.499227 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.241.46:33582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3_0Bec_B9OkZP_i9LwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:33.911301 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:44888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ4ZqmL8PQht4WJFlH_wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:35.127549 2026] [:error] [pid 1731:tid 140411674785536] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ4wb2qCuy5irgBMjJRgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:35.283914 2026] [:error] [pid 2553:tid 140411616036608] [client 74.7.243.203:44904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ4_0Bec_B9OkZP_i9MQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:36.448369 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:33598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5JDEJR9VXonE_-1PFgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:36.451260 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.243.203:44906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5NCmCSWTlPouqorMFQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:37.687022 2026] [:error] [pid 2553:tid 140411590858496] [client 74.7.241.46:33612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5f0Bec_B9OkZP_i9NgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:37.749856 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:44920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5QeiSKl8TjouI-YCWQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:39.089154 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:44924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ56BJNF7axNlVR0X8kwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:40.279056 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:47850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ6NCmCSWTlPouqorMGAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:41.643943 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:47862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ6QeiSKl8TjouI-YCXgAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:42.995185 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:47876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ6u82sZHvlq4xgHrCiQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:44.130912 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:47886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ7KBJNF7axNlVR0X8lQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:46.126555 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:47900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ7ZDEJR9VXonE_-1PGwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:50.423447 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.241.46:38356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ8pqmL8PQht4WJFlIDwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:50.554908 2026] [:error] [pid 2159:tid 140411590858496] [client 74.7.243.203:47916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ8vct6CQ8jnRyg2p8iQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:53.379210 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ9ZDEJR9VXonE_-1PHgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:54.745647 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.243.203:49916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ9lKJy4A1bGlmj9BV0AAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:56.079427 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-Ab2qCuy5irgBMjJTAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:57.270426 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:49920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-dCmCSWTlPouqorMHgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:58.615218 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:49932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-gb2qCuy5irgBMjJTQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:59.950132 2026] [:error] [pid 2159:tid 140411557287680] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-_ct6CQ8jnRyg2p8kQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:03.494851 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ_6BJNF7axNlVR0X8pQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:04.819588 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKAO82sZHvlq4xgHrCkgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:06.118243 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:44622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKApqmL8PQht4WJFlIFAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:07.893408 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:44628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKA-82sZHvlq4xgHrClQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:09.226468 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:44644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKBf0Bec_B9OkZP_i9RgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:10.542648 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:48210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKBqBJNF7axNlVR0X8rgAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:11.849188 2026] [:error] [pid 2553:tid 140411683178240] [client 74.7.243.203:48226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKB_0Bec_B9OkZP_i9RwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:13.135545 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:48240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKCdCmCSWTlPouqorMIgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:13.345931 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:48240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKCdCmCSWTlPouqorMIwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:14.725834 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:48246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKCtCmCSWTlPouqorMJQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:17.068098 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:48254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKDZDEJR9VXonE_-1PKQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:19.374021 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.244.31:57912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablKDtCmCSWTlPouqorMJwAAAMM"]
[Tue Mar 17 09:33:19.375175 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:48256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKDpqmL8PQht4WJFlIFwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:21.786669 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:48964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKEKBJNF7axNlVR0X8uQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:25.490307 2026] [:error] [pid 1731:tid 140411716749056] [client 74.7.243.203:48978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKFAb2qCuy5irgBMjJYQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:26.845847 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:48994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKFu82sZHvlq4xgHrCoAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:28.163126 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKGKBJNF7axNlVR0X8wgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:30.491320 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.243.203:49018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKGlKJy4A1bGlmj9BV4QAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:31.828812 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.243.203:37478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKG1KJy4A1bGlmj9BV5AAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:34.180096 2026] [:error] [pid 2553:tid 140411666392832] [client 74.7.243.203:37490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKHv0Bec_B9OkZP_i9TQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:35.510629 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.243.203:37506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKH5DEJR9VXonE_-1PLgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:36.811846 2026] [:error] [pid 2553:tid 140411741927168] [client 74.7.243.203:37508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKIP0Bec_B9OkZP_i9TwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:38.773658 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:37524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKIu82sZHvlq4xgHrCpgAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:40.172939 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:49820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKJO82sZHvlq4xgHrCqAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:41.536125 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:49828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKJZDEJR9VXonE_-1PMgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:42.875029 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.243.203:49840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKJlKJy4A1bGlmj9BV5wAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:44.216096 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.243.203:49842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKKFKJy4A1bGlmj9BV6AAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:45.524668 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKKQb2qCuy5irgBMjJcQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:46.897894 2026] [:error] [pid 2553:tid 140411649607424] [client 74.7.243.203:49864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKKv0Bec_B9OkZP_i9VgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:48.196488 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.243.203:49866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKLFKJy4A1bGlmj9BV6wAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:48.674229 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.243.203:49872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKLJDEJR9VXonE_-1PNwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:50.281672 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.243.203:55370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKLvct6CQ8jnRyg2p8qQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:51.832489 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.243.203:55378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKL1KJy4A1bGlmj9BV7AAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:53.375931 2026] [:error] [pid 2159:tid 140411582465792] [client 74.7.243.203:55386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKMfct6CQ8jnRyg2p8qwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:54.906884 2026] [:error] [pid 2159:tid 140411574073088] [client 74.7.243.203:55392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKMvct6CQ8jnRyg2p8rAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:55.544708 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:48744] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablKM5DEJR9VXonE_-1PRAAAAQ4"]
[Tue Mar 17 09:33:56.547368 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.243.203:55396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKNJqmL8PQht4WJFlILgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:59.330137 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.243.203:55400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKN1KJy4A1bGlmj9BV9QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:02.416727 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:46854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKOu82sZHvlq4xgHrCswAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:04.053425 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:46870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKPP0Bec_B9OkZP_i9ZAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:05.313549 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:46880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKPZqmL8PQht4WJFlIMgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:06.681072 2026] [:error] [pid 2553:tid 140411708356352] [client 74.7.243.203:46890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKPv0Bec_B9OkZP_i9ZgAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:08.749537 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:46900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKQNCmCSWTlPouqorMPAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:10.099536 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:46904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKQpqmL8PQht4WJFlINAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:11.464706 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:50674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKQ5DEJR9VXonE_-1PUQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:12.762384 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.243.203:50686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKRJDEJR9VXonE_-1PVAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:14.644445 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:50700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKRgeiSKl8TjouI-YCjQAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:18.551571 2026] [:error] [pid 2159:tid 140411599251200] [client 74.7.243.203:50716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKSvct6CQ8jnRyg2p8swAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:20.083848 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:50722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKTAeiSKl8TjouI-YCjgAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:21.214180 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:52216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKTQeiSKl8TjouI-YCkAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:22.558270 2026] [:error] [pid 2553:tid 140411741927168] [client 74.7.243.203:52226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKTv0Bec_B9OkZP_i9bgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:23.882132 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.243.203:52230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKT_ct6CQ8jnRyg2p8tQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:25.236272 2026] [:error] [pid 2159:tid 140411649607424] [client 74.7.243.203:52242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKUfct6CQ8jnRyg2p8tgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:26.547508 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:52258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKUu82sZHvlq4xgHrCvQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:27.882424 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.243.203:52262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKU1KJy4A1bGlmj9BWCAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:29.207427 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:52268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKVQb2qCuy5irgBMjJpwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:30.574299 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:55898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKVtCmCSWTlPouqorMSAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:31.901469 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.243.203:55904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKV_ct6CQ8jnRyg2p8ugAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:33.095098 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.243.203:55914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKWf0Bec_B9OkZP_i9cgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:34.394034 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:55926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKWlKJy4A1bGlmj9BWDwAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:37.813379 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.243.203:55930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKXZDEJR9VXonE_-1PYwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:39.138329 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:55934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKX5qmL8PQht4WJFlIPwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:41.545569 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:43618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKYaBJNF7axNlVR0X9LAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:42.934167 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:43624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKYlKJy4A1bGlmj9BWGQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:44.259811 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:43632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKZJqmL8PQht4WJFlIQgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:45.482475 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:43638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKZQeiSKl8TjouI-YClwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:46.707773 2026] [:error] [pid 2159:tid 140411590858496] [client 74.7.243.203:43654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKZvct6CQ8jnRyg2p8wQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:48.098709 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:43664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKaJqmL8PQht4WJFlIRAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:49.444564 2026] [:error] [pid 2159:tid 140411716749056] [client 74.7.243.203:43666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKafct6CQ8jnRyg2p8wgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:56.107518 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.243.203:48994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKcFKJy4A1bGlmj9BWKQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:57.382910 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:49010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKcQeiSKl8TjouI-YCnQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:58.667889 2026] [:error] [pid 2553:tid 140411641214720] [client 74.7.243.203:49012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKcv0Bec_B9OkZP_i9egAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:59.952656 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:49020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKc5qmL8PQht4WJFlIRgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:00.242614 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.241.46:37236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKdFKJy4A1bGlmj9BWLQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:01.329309 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:39906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKde82sZHvlq4xgHrCzQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:03.270178 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:39922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKd5DEJR9VXonE_-1PcwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:04.669553 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:39928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKeJqmL8PQht4WJFlISgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:06.263404 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:39944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKedCmCSWTlPouqorMWgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:07.632923 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:39956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKe5DEJR9VXonE_-1PdAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:08.943253 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:39962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKfAb2qCuy5irgBMjJyQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:09.175123 2026] [:error] [pid 1731:tid 140411699963648] [client 74.7.243.203:39962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKfQb2qCuy5irgBMjJygAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:13.537630 2026] [:error] [pid 2553:tid 140411540502272] [client 74.7.241.46:49752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKgP0Bec_B9OkZP_i9hAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:14.927056 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.241.46:52494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKgvct6CQ8jnRyg2p8zgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:15.717633 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:50664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKgwb2qCuy5irgBMjJ1AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:17.636770 2026] [:error] [pid 2159:tid 140411557287680] [client 74.7.241.46:52498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKhfct6CQ8jnRyg2p80QAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:18.045393 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:50672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKhqBJNF7axNlVR0X9RwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:18.964529 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:47604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKhtCmCSWTlPouqorMXgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:20.129297 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:47616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKiO82sZHvlq4xgHrC1QAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:28.239237 2026] [:error] [pid 2159:tid 140411683178240] [client 74.7.243.203:50684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKkPct6CQ8jnRyg2p83wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:28.457840 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:47618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKkJqmL8PQht4WJFlIWwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:29.532030 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:35504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKkZqmL8PQht4WJFlIXwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:36.179346 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKmNCmCSWTlPouqorMbAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:48.914645 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:33654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKpAeiSKl8TjouI-YCwAAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:50.212810 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKppDEJR9VXonE_-1PhQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:00.319152 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:49290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKsO82sZHvlq4xgHrC-AAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:16.575517 2026] [:error] [pid 2159:tid 140411632822016] [client 74.7.243.203:48258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKwPct6CQ8jnRyg2p89AAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:36:32.142374 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:52898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKztCmCSWTlPouqorMogAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:33.263044 2026] [:error] [pid 2159:tid 140411691570944] [client 74.7.243.203:52892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK0fct6CQ8jnRyg2p9AwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:36:42.171837 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:59768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK2pqmL8PQht4WJFlIfwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:50.103143 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:48376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK4tCmCSWTlPouqorMswAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:37:12.006893 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:52270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK-FKJy4A1bGlmj9BWcwAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:15.524976 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.243.203:45282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK-1KJy4A1bGlmj9BWegAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:37:22.532305 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.243.203:45286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLAv0Bec_B9OkZP_i9uAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:37:38.840247 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.241.46:58146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLEpqmL8PQht4WJFlIugAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:40.215634 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.241.46:33788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLFP0Bec_B9OkZP_i9wQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:41.537840 2026] [:error] [pid 2553:tid 140411708356352] [client 74.7.241.46:33798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLFf0Bec_B9OkZP_i9wwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:43.027441 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.46:33800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLFqBJNF7axNlVR0X9igAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:44.433697 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.46:33814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLGAeiSKl8TjouI-YC8QAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:58.056173 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.241.46:33828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLJpqmL8PQht4WJFlIzAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:38:10.095609 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:60132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLMqBJNF7axNlVR0X9rQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:38:14.611384 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:35196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLNqBJNF7axNlVR0X9tAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:38:34.746839 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:43282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLSu82sZHvlq4xgHrDoQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:38:36.077858 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.243.203:47202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLTJDEJR9VXonE_-1P9AAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:38:40.746951 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:47216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLUFKJy4A1bGlmj9BWoAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:38:46.382448 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:56784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLVgeiSKl8TjouI-YDKQAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:38:57.583792 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.228.16:40560] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablLYVKJy4A1bGlmj9BWogAAAkE"]
[Tue Mar 17 09:39:54.531491 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:35208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLmpDEJR9VXonE_-1QUAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:40:07.411583 2026] [:error] [pid 2553:tid 140411716749056] [client 74.7.241.46:50214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLp_0Bec_B9OkZP_i-SAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:40:40.919384 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.241.46:60602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLyFKJy4A1bGlmj9BW4gAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:40:45.419599 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.241.46:54998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLzfct6CQ8jnRyg2p9aQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:40:56.893527 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:55004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL2JDEJR9VXonE_-1QbwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:40:57.943195 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:34354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL2f0Bec_B9OkZP_i-cAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:41:09.497089 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:60364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL5ZqmL8PQht4WJFlJdAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:41:22.073855 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.241.46:50080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL8pDEJR9VXonE_-1QkQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:41:23.801137 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:37930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL81KJy4A1bGlmj9BW-wAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:41:34.621090 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL_gb2qCuy5irgBMjKhQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:41:51.174756 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:39328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMD9CmCSWTlPouqorNNwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:41:53.577511 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.241.46:37016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMEfct6CQ8jnRyg2p9gwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:41:59.298275 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:46498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMFqBJNF7axNlVR0X-IQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:42:16.311058 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:56238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMKFKJy4A1bGlmj9BXKwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:42:49.311270 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:37020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMSQeiSKl8TjouI-YDrwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:42:51.695585 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:40480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMS9CmCSWTlPouqorNVgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:42:56.627490 2026] [:error] [pid 2159:tid 140411741927168] [client 74.7.241.46:40482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMUPct6CQ8jnRyg2p9nQAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:43:20.226061 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.244.31:45250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablMaAeiSKl8TjouI-YDwgAAA8o"]
[Tue Mar 17 09:43:22.359745 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:60420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMapDEJR9VXonE_-1Q3gAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:43:30.460443 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:35320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMcpqmL8PQht4WJFlJ9QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:43:33.835215 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:41294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMdaBJNF7axNlVR0X-SgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:43:37.264337 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:41308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMeQb2qCuy5irgBMjKzQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:43:38.568454 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:41320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMepqmL8PQht4WJFlJ_AAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:43:41.299126 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:41332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMfQeiSKl8TjouI-YDygAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:02.923648 2026] [:error] [pid 2553:tid 140411674785536] [client 74.7.243.203:58496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMkv0Bec_B9OkZP_i-1AAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:06.788126 2026] [:error] [pid 2553:tid 140411574073088] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMlv0Bec_B9OkZP_i-1wAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:44:08.181812 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:33646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMmAb2qCuy5irgBMjK1wAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:44:20.172030 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:33662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMpJDEJR9VXonE_-1RBgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:34.355264 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:49652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMstCmCSWTlPouqorNfgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:52.021343 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:60850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMxO82sZHvlq4xgHrEyQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:00.203389 2026] [:error] [pid 2159:tid 140411548894976] [client 74.7.241.46:47308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMzPct6CQ8jnRyg2p93gAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:10.371876 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:51812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM1tCmCSWTlPouqorNlQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:45:12.733619 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:38158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM2JqmL8PQht4WJFlKVQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:23.707188 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.241.46:38162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM4_0Bec_B9OkZP_i_AAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:27.512401 2026] [:error] [pid 2159:tid 140411733534464] [client 74.7.243.203:55942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM5_ct6CQ8jnRyg2p9_AAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:30.907705 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.243.203:47784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM6pqmL8PQht4WJFlKYQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:30.979188 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.241.46:34944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM6v0Bec_B9OkZP_i_BgAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:45:32.276255 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:45868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM7AeiSKl8TjouI-YD-QAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:32.286642 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.241.46:37310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM7JDEJR9VXonE_-1RPQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:37.177995 2026] [:error] [pid 1731:tid 140411616036608] [client 74.7.241.46:37326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM8Qb2qCuy5irgBMjLAwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:46:06.941550 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:45882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNDgb2qCuy5irgBMjLIgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:46:10.796760 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:50328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNEpDEJR9VXonE_-1RagAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:46:23.611128 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNHweiSKl8TjouI-YEFQAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:46:53.370991 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:49664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNPdCmCSWTlPouqorN-wAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:46:55.756078 2026] [:error] [pid 1731:tid 140411582465792] [client 74.7.241.46:54124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNPwb2qCuy5irgBMjLNwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:46:57.023148 2026] [:error] [pid 2553:tid 140411607643904] [client 74.7.241.46:54136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNQf0Bec_B9OkZP_i_KQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:02.519034 2026] [:error] [pid 2159:tid 140411683178240] [client 74.7.241.46:39948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNRvct6CQ8jnRyg2p-JwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:03.835046 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:39958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNR-82sZHvlq4xgHrE_gAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:05.015278 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:39968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNSZqmL8PQht4WJFlKgAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:06.336235 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNSgeiSKl8TjouI-YELQAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:08.769062 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.46:39994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNTAeiSKl8TjouI-YENAAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:10.114613 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:50130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNTu82sZHvlq4xgHrFBAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:13.867241 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.241.46:50132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNUQb2qCuy5irgBMjLQwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:15.235264 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:50146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNU1KJy4A1bGlmj9BXnwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:22.340252 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:50150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNWu82sZHvlq4xgHrFDAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:23.205130 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:54594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNW6BJNF7axNlVR0X-zwAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:47:25.966497 2026] [:error] [pid 2553:tid 140411607643904] [client 74.7.243.203:45794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNXP0Bec_B9OkZP_i_NgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:47:28.221352 2026] [:error] [pid 2553:tid 140411540502272] [client 74.7.241.46:34144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNYP0Bec_B9OkZP_i_OQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:29.587580 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:41746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNYdCmCSWTlPouqorOEQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:32.000660 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.241.46:41760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNY5qmL8PQht4WJFlKkAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:35.224937 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.46:41772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNZweiSKl8TjouI-YEPQAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:37.627630 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:41774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNaVKJy4A1bGlmj9BXsQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:43.371250 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:49360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNbweiSKl8TjouI-YESQAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:45.772031 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:49366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNce82sZHvlq4xgHrFFgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:48.209236 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:49380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNdKBJNF7axNlVR0X-0wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:49.558247 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:36806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNde82sZHvlq4xgHrFGAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:50.879328 2026] [:error] [pid 1731:tid 140411716749056] [client 74.7.241.46:36810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNdgb2qCuy5irgBMjLWAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:52.190070 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.46:36826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNeKBJNF7axNlVR0X-2AAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:53.528660 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.241.46:36840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNef0Bec_B9OkZP_i_RAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:57.500107 2026] [:error] [pid 2159:tid 140411607643904] [client 74.7.241.46:36856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNffct6CQ8jnRyg2p-RAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:59.875411 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:35022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNf5DEJR9VXonE_-1R5gAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:02.567301 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.241.46:35026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNggb2qCuy5irgBMjLYwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:03.879023 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:35030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNg1KJy4A1bGlmj9BX2AAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:10.742981 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:35042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNigeiSKl8TjouI-YEWwAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:12.019407 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:39040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjNCmCSWTlPouqorOIgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:13.257234 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:39046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjZqmL8PQht4WJFlKogAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:14.459227 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.241.46:39062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjgb2qCuy5irgBMjLZwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:14.825177 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:45806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjlKJy4A1bGlmj9BX4wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:16.811191 2026] [:error] [pid 2159:tid 140411540502272] [client 74.7.241.46:39074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNkPct6CQ8jnRyg2p-TQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:18.107075 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNkv0Bec_B9OkZP_i_UgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:19.296284 2026] [:error] [pid 2553:tid 140411574073088] [client 74.7.241.46:53906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNk_0Bec_B9OkZP_i_UwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:19.423919 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:59236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNk6BJNF7axNlVR0X-8wAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:21.678412 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:53918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNlQeiSKl8TjouI-YEXwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:23.318987 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.244.31:32998] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablNlweiSKl8TjouI-YEYwAAA8I"]
[Tue Mar 17 09:48:24.129254 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.46:53924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNmAeiSKl8TjouI-YEZQAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:25.530729 2026] [:error] [pid 2553:tid 140411725141760] [client 74.7.241.46:53934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNmf0Bec_B9OkZP_i_VgAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:36.353915 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.241.46:53940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNpJDEJR9VXonE_-1R_QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:40.512017 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:44116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNqAeiSKl8TjouI-YEcwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:46.491826 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.243.203:52736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNrvct6CQ8jnRyg2p-bgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:48:54.699390 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:53296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNtgeiSKl8TjouI-YEgAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:59.851687 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:42408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNu9CmCSWTlPouqorOQgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:49:02.484651 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.228.16:53374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablNvqBJNF7axNlVR0X_IwAAABQ"]
[Tue Mar 17 09:49:03.375442 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:34082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNv-82sZHvlq4xgHrFUQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:49:04.729060 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:53884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNwFKJy4A1bGlmj9BX9AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:49:05.905707 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:53888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNwZDEJR9VXonE_-1SDwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:50:39.968615 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:36724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOH5qmL8PQht4WJFlLJgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:50:44.452880 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:38894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOJFKJy4A1bGlmj9BYNAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:50:45.764614 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:38902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOJZDEJR9VXonE_-1SSAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:50:53.500457 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOLZDEJR9VXonE_-1SWAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:50:54.837592 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.243.203:40434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOLv0Bec_B9OkZP_i_owAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:50:56.556751 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOLtCmCSWTlPouqorOwgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:50:57.920022 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:58940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOMZqmL8PQht4WJFlLMAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:50:59.095893 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:45124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOM6BJNF7axNlVR0X_qwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:51:09.379237 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:45134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOPe82sZHvlq4xgHrFmgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:51:12.927709 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:44686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOQAeiSKl8TjouI-YE3QAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:15.527037 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.241.46:44688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOQ9CmCSWTlPouqorOygAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:51:16.804972 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:44696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablORO82sZHvlq4xgHrFnAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:21.579925 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.241.46:49256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOSZDEJR9VXonE_-1SXwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:32.036223 2026] [:error] [pid 2553:tid 140411599251200] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOVP0Bec_B9OkZP_i_wgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:51:34.481069 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.241.46:46040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOVlKJy4A1bGlmj9BYTAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:39.636144 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:46046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOW-82sZHvlq4xgHrFpQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:51:54.924465 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:40448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOapqmL8PQht4WJFlLawAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:58.368999 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:42872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablObpqmL8PQht4WJFlLcQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:52:02.185098 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:42888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOcqBJNF7axNlVR0X_ygAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:03.507285 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:52022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOc9CmCSWTlPouqorO2wAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:04.892634 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:52034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOdO82sZHvlq4xgHrFtQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:06.279564 2026] [:error] [pid 1731:tid 140411699963648] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOdgb2qCuy5irgBMjL1QAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:07.598937 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:52060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOd1KJy4A1bGlmj9BYdAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:08.989188 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:52064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOeJDEJR9VXonE_-1ScwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:09.974656 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:54700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOeVKJy4A1bGlmj9BYegAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:10.285618 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.243.203:42350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOelKJy4A1bGlmj9BYewAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:11.605572 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:42352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOe6BJNF7axNlVR0X_0QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:13.190298 2026] [:error] [pid 2159:tid 140411733534464] [client 74.7.243.203:42358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOffct6CQ8jnRyg2p-zQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:14.582735 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.243.203:42360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOflKJy4A1bGlmj9BYgAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:15.739787 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:36026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOf1KJy4A1bGlmj9BYgwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:52:17.352631 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.243.203:42374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOf6t8Nd0UC_OcbVGx9gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:18.692232 2026] [:error] [pid 17965:tid 140411699963648] [client 74.7.243.203:42380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOgqt8Nd0UC_OcbVGx-gAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:19.974012 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:42382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOg5qmL8PQht4WJFlLegAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:21.291630 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.243.203:44472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOhat8Nd0UC_OcbVGyAAAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:22.647254 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:44474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOhu82sZHvlq4xgHrFuwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:23.974531 2026] [:error] [pid 2159:tid 140411548894976] [client 74.7.243.203:44488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOh_ct6CQ8jnRyg2p-0wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:25.311364 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.243.203:44496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOidCmCSWTlPouqorO7AAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:26.703940 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:44506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOipDEJR9VXonE_-1SdwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:28.050188 2026] [:error] [pid 2553:tid 140411649607424] [client 74.7.243.203:44516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOjP0Bec_B9OkZP_i_1gAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:30.081967 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:57174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOjtCmCSWTlPouqorO8gAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:30.083297 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.243.203:44532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOjVKJy4A1bGlmj9BYhgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:31.590933 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.243.203:37700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOj_0Bec_B9OkZP_i_2wAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:33.018048 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.243.203:37714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOkat8Nd0UC_OcbVGyAwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:33.415389 2026] [:error] [pid 2553:tid 140411548894976] [client 74.7.241.46:60914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOkf0Bec_B9OkZP_i_3AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:52:34.217108 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:37726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOkgeiSKl8TjouI-YFMgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:35.562962 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:37738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOk5DEJR9VXonE_-1SegAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:37.004305 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:37744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOlf0Bec_B9OkZP_i_3gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:38.349125 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:37746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOlpDEJR9VXonE_-1SfgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:39.588107 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:37758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOl5qmL8PQht4WJFlLhwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:40.944330 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:34512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOmKBJNF7axNlVR0X_2gAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:42.251043 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.243.203:34514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOmvct6CQ8jnRyg2p-2AAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:43.626211 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:34526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOmwb2qCuy5irgBMjL3QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:45.028524 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:34534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOnQb2qCuy5irgBMjL3wAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:46.485293 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:34538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOnu82sZHvlq4xgHrFwgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:47.881338 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOn9CmCSWTlPouqorO-AAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:49.292271 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.243.203:34564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOoat8Nd0UC_OcbVGyEwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:50.126067 2026] [access_compat:error] [pid 17965:tid 140411574073088] [client 117.210.132.24:51467] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 09:52:50.367468 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.46:60924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOoqt8Nd0UC_OcbVGyFgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:52:50.648419 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:58878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOogb2qCuy5irgBMjL5AAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:52.035558 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:58886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpAb2qCuy5irgBMjL5gAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:53.003814 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.241.46:44070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpQb2qCuy5irgBMjL5wAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:52:53.419025 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:58896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpQeiSKl8TjouI-YFPQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:54.799757 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:58900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpgeiSKl8TjouI-YFQAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:55.472953 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:44074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOp-82sZHvlq4xgHrFxAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:52:56.131303 2026] [:error] [pid 2159:tid 140411565680384] [client 74.7.243.203:58910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqPct6CQ8jnRyg2p-5QAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:57.468240 2026] [:error] [pid 2553:tid 140411733534464] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqf0Bec_B9OkZP_i_6AAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:57.823584 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.241.46:44076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqf0Bec_B9OkZP_i_6QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:58.760098 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:58928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqqBJNF7axNlVR0X_4AAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:00.089138 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:58930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOrAeiSKl8TjouI-YFRAAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:00.185283 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:50714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOrJDEJR9VXonE_-1ShgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:53:01.515057 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.243.203:37682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOrVKJy4A1bGlmj9BYkQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:03.052252 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.203:37686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOr6t8Nd0UC_OcbVGyHAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:04.362911 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:37700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOsP0Bec_B9OkZP_i_7wAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:05.692163 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:37708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOsQb2qCuy5irgBMjL7gAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:09.600310 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:50730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOte82sZHvlq4xgHrF0gAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:53:17.859351 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.241.46:44022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOvAb2qCuy5irgBMjL9AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:18.942475 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:37722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOvpDEJR9VXonE_-1SlAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:21.584875 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:52302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOwQeiSKl8TjouI-YFUQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:23.916808 2026] [:error] [pid 2159:tid 140411548894976] [client 74.7.243.203:59082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOw_ct6CQ8jnRyg2p-_wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:27.703440 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:59094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOx6BJNF7axNlVR0X_8QAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:29.026471 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:59108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOyat8Nd0UC_OcbVGyKAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:53:49.396803 2026] [:error] [pid 2159:tid 140411632822016] [client 74.7.241.46:52316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO3fct6CQ8jnRyg2p_LwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:54.142666 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:46826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO4pqmL8PQht4WJFlLlQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:55.503625 2026] [:error] [pid 2159:tid 140411716749056] [client 74.7.241.46:46842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO4_ct6CQ8jnRyg2p_NwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:54:03.239125 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.228.16:45456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablO6wb2qCuy5irgBMjL_gAAAEY"]
[Tue Mar 17 09:54:05.435424 2026] [:error] [pid 2159:tid 140411540502272] [client 74.7.241.46:46842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO7fct6CQ8jnRyg2p_SwAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:54:10.465710 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.46:39650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO8tCmCSWTlPouqorPBwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:54:14.140077 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:38040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO9u82sZHvlq4xgHrF6gAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:54:35.406123 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:38056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPC6BJNF7axNlVR0UAEwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:54:37.814937 2026] [:error] [pid 18257:tid 140411725141760] [client 74.7.241.46:56706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPDdrpm-qFp5fwuEQ_ZQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:54:38.105960 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:60550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPDlKJy4A1bGlmj9BY8gAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:54:45.741060 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPFTarLhPAjZGI1b2wngAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:55:10.431364 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:53454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPLgb2qCuy5irgBMjMHwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:55:30.855990 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:59722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPQpDEJR9VXonE_-1StgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:58:55.432992 2026] [:error] [pid 18604:tid 140411632822016] [client 74.7.244.31:38794] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablQD0Bd0UqwxWindINrNgAAA00"]
[Tue Mar 17 09:58:59.618090 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.241.46:37824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablQE0Bd0UqwxWindINrOQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:59:59.203284 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablQT5DEJR9VXonE_-1S3QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:01:02.325640 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.241.46:57712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablQjv0Bec_B9OkZP_jAPQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:03:08.888073 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRDAeiSKl8TjouI-YFvwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:04:04.512190 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:53022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRRKBJNF7axNlVR0UAbgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:04:12.443688 2026] [access_compat:error] [pid 1016:tid 140411666392832] [client 185.177.72.38:38344] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Tue Mar 17 10:04:12.770910 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.244.31:43410] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablRTJqmL8PQht4WJFlMDwAAAUY"]
[Tue Mar 17 10:04:49.548967 2026] [access_compat:error] [pid 18709:tid 140411565680384] [client 185.177.72.38:38878] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/app.py
[Tue Mar 17 10:04:54.399667 2026] [access_compat:error] [pid 2325:tid 140411548894976] [client 185.177.72.38:38964] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/app_dev.php
[Tue Mar 17 10:05:03.499761 2026] [:error] [pid 2159:tid 140411725141760] [client 74.7.241.46:58598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRf_ct6CQ8jnRyg2p_9QAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:05:03.722684 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.228.16:58088] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablRf64xEDsg_V3ESNY3EQAAAgk"]
[Tue Mar 17 10:05:56.504939 2026] [access_compat:error] [pid 1731:tid 140411557287680] [client 185.177.72.38:39726] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/db.php
[Tue Mar 17 10:06:00.800352 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.241.46:56098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRuEBd0UqwxWindINrwwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:06:08.830720 2026] [access_compat:error] [pid 1731:tid 140411632822016] [client 185.177.72.38:39932] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/functions.php
[Tue Mar 17 10:06:11.676790 2026] [access_compat:error] [pid 1731:tid 140411641214720] [client 185.177.72.38:39932] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/header.php
[Tue Mar 17 10:06:23.632583 2026] [access_compat:error] [pid 11293:tid 140411540502272] [client 185.177.72.38:40078] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Tue Mar 17 10:06:56.712627 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.46:55314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablR8K4xEDsg_V3ESNY3KQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:07:22.593155 2026] [access_compat:error] [pid 2325:tid 140411733534464] [client 185.177.72.38:40886] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Tue Mar 17 10:07:25.877811 2026] [access_compat:error] [pid 17965:tid 140411641214720] [client 45.232.52.179:49995] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:26.006796 2026] [access_compat:error] [pid 18709:tid 140411574073088] [client 115.245.208.51:63017] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:28.166996 2026] [access_compat:error] [pid 17965:tid 140411716749056] [client 45.232.52.179:49999] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:28.585236 2026] [access_compat:error] [pid 11293:tid 140411666392832] [client 115.245.208.51:63020] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:38.930623 2026] [access_compat:error] [pid 17965:tid 140411574073088] [client 185.177.72.38:41068] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/server_info.php
[Tue Mar 17 10:07:40.614754 2026] [access_compat:error] [pid 2325:tid 140411582465792] [client 185.177.72.38:41126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.py
[Tue Mar 17 10:07:43.676960 2026] [access_compat:error] [pid 11293:tid 140411607643904] [client 185.177.72.38:41162] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sms.py
[Tue Mar 17 10:07:52.920013 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:58140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSKO82sZHvlq4xgHrGggAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:07:53.708501 2026] [access_compat:error] [pid 18604:tid 140411666392832] [client 185.177.72.38:41294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Tue Mar 17 10:08:14.166155 2026] [core:error] [pid 18380:tid 140411741927168] [client 185.177.72.38:41526] AH10244: invalid URI path (/%home)
[Tue Mar 17 10:08:51.916221 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.241.46:59788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSY0Bd0UqwxWindINr2wAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:09:01.979803 2026] [access_compat:error] [pid 18380:tid 140411691570944] [client 128.1.227.246:59105] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:02.015310 2026] [access_compat:error] [pid 18709:tid 140411741927168] [client 128.1.227.246:59106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:08.498264 2026] [:error] [pid 18604:tid 140411666392832] [client 185.177.72.38:42280] [client 185.177.72.38] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "127.0.0.1"] [uri "/vuln.php"] [unique_id "ablSdEBd0UqwxWindINr3gAAA0k"]
[Tue Mar 17 10:09:10.191301 2026] [access_compat:error] [pid 2473:tid 140411624429312] [client 185.177.72.38:42282] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Tue Mar 17 10:09:11.373493 2026] [access_compat:error] [pid 2325:tid 140411733534464] [client 128.1.227.246:59494] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:11.460003 2026] [access_compat:error] [pid 18604:tid 140411674785536] [client 128.1.227.246:59498] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:13.964888 2026] [:error] [pid 18709:tid 140411708356352] [client 74.7.244.31:38086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablSeTarLhPAjZGI1b2x6AAAA4Q"]
[Tue Mar 17 10:09:28.312189 2026] [access_compat:error] [pid 18380:tid 140411725141760] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/auth.php
[Tue Mar 17 10:09:28.506517 2026] [access_compat:error] [pid 18380:tid 140411616036608] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/session.php
[Tue Mar 17 10:09:28.700289 2026] [access_compat:error] [pid 18380:tid 140411582465792] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/reset.php
[Tue Mar 17 10:09:28.895306 2026] [access_compat:error] [pid 18380:tid 140411708356352] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/forgot.php
[Tue Mar 17 10:09:29.089018 2026] [access_compat:error] [pid 18380:tid 140411683178240] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/password.php
[Tue Mar 17 10:09:29.284640 2026] [access_compat:error] [pid 18380:tid 140411624429312] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/login.php
[Tue Mar 17 10:09:29.478179 2026] [access_compat:error] [pid 18380:tid 140411699963648] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/logout.php
[Tue Mar 17 10:09:29.671700 2026] [access_compat:error] [pid 18380:tid 140411607643904] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/register.php
[Tue Mar 17 10:09:29.865598 2026] [access_compat:error] [pid 18380:tid 140411691570944] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/contact.php
[Tue Mar 17 10:09:31.534556 2026] [access_compat:error] [pid 18380:tid 140411632822016] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/api.php
[Tue Mar 17 10:09:34.720699 2026] [access_compat:error] [pid 2473:tid 140411624429312] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dev.php
[Tue Mar 17 10:09:36.402059 2026] [access_compat:error] [pid 2473:tid 140411716749056] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/old.php
[Tue Mar 17 10:09:36.603051 2026] [access_compat:error] [pid 2473:tid 140411683178240] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bak.php
[Tue Mar 17 10:09:36.803978 2026] [access_compat:error] [pid 2473:tid 140411548894976] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/backup.php
[Tue Mar 17 10:09:37.005169 2026] [access_compat:error] [pid 2473:tid 140411699963648] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php_test.php
[Tue Mar 17 10:09:37.206000 2026] [access_compat:error] [pid 2473:tid 140411540502272] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/check.php
[Tue Mar 17 10:09:37.406706 2026] [access_compat:error] [pid 2473:tid 140411574073088] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/tmp.php
[Tue Mar 17 10:09:42.119356 2026] [access_compat:error] [pid 18380:tid 140411641214720] [client 185.177.72.38:42786] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adminer.php
[Tue Mar 17 10:09:42.322694 2026] [access_compat:error] [pid 18380:tid 140411674785536] [client 185.177.72.38:42786] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/setup.php
[Tue Mar 17 10:09:50.839745 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:59390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSnqBJNF7axNlVR0UAuwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:09:51.426058 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:53780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSnweiSKl8TjouI-YGRwAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:10:06.573498 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.243.203:53970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSrq4xEDsg_V3ESNY3cwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:10:24.755622 2026] [access_compat:error] [pid 18709:tid 140411565680384] [client 185.177.72.38:43468] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Tue Mar 17 10:10:38.339799 2026] [access_compat:error] [pid 18604:tid 140411708356352] [client 185.177.72.38:43692] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Tue Mar 17 10:10:48.637401 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:34574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS2KBJNF7axNlVR0UAxAAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:11:01.824663 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:38516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS5dCmCSWTlPouqorP5QAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:11:08.410540 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS7DarLhPAjZGI1b2yCgAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:24.684215 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:47512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS_KBJNF7axNlVR0UA3wAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:26.087017 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.203:51882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS_q4xEDsg_V3ESNY3gAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:27.434996 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:51896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS_-82sZHvlq4xgHrG4AAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:28.805614 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:51910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTANCmCSWTlPouqorP6AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:11:33.202085 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:51922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTBe82sZHvlq4xgHrG8AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:11:45.234687 2026] [access_compat:error] [pid 18709:tid 140411590858496] [client 185.177.72.38:44898] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-load.php
[Tue Mar 17 10:11:45.505319 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:52012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTEaBJNF7axNlVR0UA5QAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:11:46.923284 2026] [access_compat:error] [pid 18604:tid 140411741927168] [client 185.177.72.38:44952] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Tue Mar 17 10:11:59.231051 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:35582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTH0Bd0UqwxWindINsHgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:12:17.842534 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:59982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTMa4xEDsg_V3ESNY3oAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:12:35.523392 2026] [:error] [pid 1731:tid 140411540502272] [client 74.7.243.203:35334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTQwb2qCuy5irgBMjNDgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:12:36.836659 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:41962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTRDarLhPAjZGI1b2yHAAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:12:42.459215 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:41970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTSjarLhPAjZGI1b2yIgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:43.804067 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:39948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTS64xEDsg_V3ESNY3owAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:44.992411 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:39952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTTJqmL8PQht4WJFlMcQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:46.358961 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:39968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTTkBd0UqwxWindINsKQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:47.567105 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:39978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTTwb2qCuy5irgBMjNEAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:48.842687 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:39992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTUDarLhPAjZGI1b2yJAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:50.111615 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.243.203:40000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTUgb2qCuy5irgBMjNEQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:51.479486 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:51764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTUweiSKl8TjouI-YGbAAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:52.800693 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:51772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTVO82sZHvlq4xgHrHOwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:54.195774 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:51784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTVqBJNF7axNlVR0UA_QAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:55.552580 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:51794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTV6BJNF7axNlVR0UA_gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:56.797523 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:51800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTWJqmL8PQht4WJFlMdQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:58.222757 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.243.203:51802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTWgb2qCuy5irgBMjNEgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:59.664145 2026] [:error] [pid 1731:tid 140411674785536] [client 74.7.243.203:51804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTWwb2qCuy5irgBMjNEwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:01.015996 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:37144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTXUBd0UqwxWindINsKgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:02.542277 2026] [:error] [pid 17965:tid 140411590858496] [client 74.7.243.203:37156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTXqt8Nd0UC_OcbVGzNgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:03.917857 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:37172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTXweiSKl8TjouI-YGcQAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:05.237471 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:37186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTYQb2qCuy5irgBMjNFgAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:06.560964 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:37192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTYjarLhPAjZGI1b2yKgAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:07.887103 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:37200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTY-82sZHvlq4xgHrHQQAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:10.354376 2026] [:error] [pid 1731:tid 140411557287680] [client 74.7.243.203:37204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTZQb2qCuy5irgBMjNFwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:11.679915 2026] [:error] [pid 1731:tid 140411658000128] [client 74.7.243.203:44680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTZwb2qCuy5irgBMjNGAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:13.050649 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.243.203:44692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTaa4xEDsg_V3ESNY3qQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:14.308694 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:44704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTaqBJNF7axNlVR0UBAgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:15.654503 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:44716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTa64xEDsg_V3ESNY3qwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:16.966119 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.243.203:44732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTbO82sZHvlq4xgHrHRgAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:18.343171 2026] [:error] [pid 18604:tid 140411632822016] [client 74.7.243.203:44734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTbkBd0UqwxWindINsMwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:19.623361 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTb0Bd0UqwxWindINsNAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:20.799999 2026] [:error] [pid 18604:tid 140411574073088] [client 74.7.243.203:40580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTcEBd0UqwxWindINsNQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:22.137330 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:40596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTckBd0UqwxWindINsNgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:23.447742 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.243.203:40608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTc0Bd0UqwxWindINsOQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:24.603211 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:40620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTdKBJNF7axNlVR0UBBQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:25.900183 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:40622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTdQb2qCuy5irgBMjNGgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:27.236124 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:40636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTdzarLhPAjZGI1b2yLAAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:28.530527 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:40646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTeAeiSKl8TjouI-YGdwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:29.809025 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:40650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTeQb2qCuy5irgBMjNHwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:31.102853 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:57856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTezarLhPAjZGI1b2yLgAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:31.446809 2026] [access_compat:error] [pid 17965:tid 140411658000128] [client 185.177.72.38:46926] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Tue Mar 17 10:13:32.441003 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:57868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTfDarLhPAjZGI1b2yLwAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:33.843458 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:57882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTfaBJNF7axNlVR0UBCAAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:34.991387 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:57884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTfpqmL8PQht4WJFlMgAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:37.328290 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:57888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTge82sZHvlq4xgHrHTAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:38.567516 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTggb2qCuy5irgBMjNIAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:39.833432 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:57898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTgweiSKl8TjouI-YGfAAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:40.615575 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.228.16:50704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablThDarLhPAjZGI1b2yMgAAA4Y"]
[Tue Mar 17 10:13:42.190490 2026] [:error] [pid 1731:tid 140411557287680] [client 74.7.243.203:39042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablThgb2qCuy5irgBMjNIgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:43.554057 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:39048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablThweiSKl8TjouI-YGfgAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:45.889250 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:39054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTiaBJNF7axNlVR0UBDgAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:49.490879 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:39056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTjQb2qCuy5irgBMjNJgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:13:50.774611 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:41232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTjtCmCSWTlPouqorQGwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:13:55.240679 2026] [:error] [pid 18604:tid 140411607643904] [client 74.7.243.203:41238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTk0Bd0UqwxWindINsSgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:59.031274 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:41244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTlwb2qCuy5irgBMjNKgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:14:14.185930 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.244.31:37342] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablTpqBJNF7axNlVR0UBEwAAAAQ"]
[Tue Mar 17 10:14:29.706624 2026] [access_compat:error] [pid 1731:tid 140411708356352] [client 185.177.72.38:47536] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Tue Mar 17 10:14:35.846220 2026] [cgid:error] [pid 1731:tid 140411624429312] [client 185.177.72.38:47602] AH01265: attempt to invoke directory as script: /var/www/cgi-bin/
[Tue Mar 17 10:14:57.487706 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:34040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT0dCmCSWTlPouqorQTwAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:00.127892 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.243.203:48410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT1K4xEDsg_V3ESNY3wgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:07.242238 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:51702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT2-82sZHvlq4xgHrHZwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:08.541169 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:51718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT3JqmL8PQht4WJFlMnAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:11.100219 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:51734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT3zarLhPAjZGI1b2yTQAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:15:24.598885 2026] [:error] [pid 1731:tid 140411557287680] [client 74.7.243.203:44266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT7Ab2qCuy5irgBMjNTQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:30.346552 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:34548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT8u82sZHvlq4xgHrHbQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:37.006389 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:39936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT-ZqmL8PQht4WJFlMpQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:12.198014 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:39944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUHDarLhPAjZGI1b2ybAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:13.542633 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:54990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUHZqmL8PQht4WJFlMqwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:17.049835 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.243.203:54998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUIZqmL8PQht4WJFlMrgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:18.398371 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:55014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUIu82sZHvlq4xgHrHdwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:25.371720 2026] [:error] [pid 18709:tid 140411641214720] [client 74.7.243.203:55026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUKTarLhPAjZGI1b2ycgAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:28.850418 2026] [:error] [pid 18604:tid 140411590858496] [client 74.7.243.203:59040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablULEBd0UqwxWindINseAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:35.447106 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:60906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUMzarLhPAjZGI1b2yeQAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:38.917448 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:60914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUNgb2qCuy5irgBMjNZAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:43.605418 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:48916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUO64xEDsg_V3ESNY32gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:55.194832 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:48918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUR-82sZHvlq4xgHrHhgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:17:00.060873 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.243.203:39284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUTJqmL8PQht4WJFlMuwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:17:39.177673 2026] [:error] [pid 2325:tid 140411658000128] [client 160.25.172.2:29684] [client 160.25.172.2] ModSecurity: Access denied with code 403 (phase 1). String match "python-requests/" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "43"] [id "99034"] [msg "Locaweb Custom Rules: python-requests wordpress login attempt"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "ablUc-82sZHvlq4xgHrHjQAAAoo"]
[Tue Mar 17 10:17:40.447347 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:60806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUdNCmCSWTlPouqorQlgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:41.758927 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:58790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUdQb2qCuy5irgBMjNdgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:44.654404 2026] [autoindex:error] [pid 18709:tid 140411683178240] [client 160.25.172.2:63911] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Tue Mar 17 10:17:45.777694 2026] [access_compat:error] [pid 18709:tid 140411733534464] [client 160.25.172.2:63911] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:17:48.249691 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:58798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUfO82sZHvlq4xgHrHlQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:49.591853 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.243.203:58800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUfQb2qCuy5irgBMjNeQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:50.780815 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:37310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUfgeiSKl8TjouI-YGsAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:55.177326 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:37326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUg6BJNF7axNlVR0UBiQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:56.425091 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:37336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUhO82sZHvlq4xgHrHmAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:18:05.302157 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:42416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUje82sZHvlq4xgHrHmgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:18:19.137588 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:37348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUm64xEDsg_V3ESNY3_QAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:18:47.499719 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:39350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUt-82sZHvlq4xgHrHuQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:18:48.746968 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:58978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUuDarLhPAjZGI1b2y6wAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:18:54.967230 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.228.16:59182] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablUvjarLhPAjZGI1b2y9gAAA4o"]
[Tue Mar 17 10:19:06.707112 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:58980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUypqmL8PQht4WJFlM3wAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:19:10.248745 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:43228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUzpqmL8PQht4WJFlM4gAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:19:12.683263 2026] [access_compat:error] [pid 1731:tid 140411607643904] [client 185.177.72.38:51532] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Tue Mar 17 10:19:14.370686 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.244.31:59492] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablU0geiSKl8TjouI-YGvwAAA8o"]
[Tue Mar 17 10:19:51.995986 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablU9-82sZHvlq4xgHrH6wAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:20:03.657158 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:52450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVAat8Nd0UC_OcbVGz2wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:06.472793 2026] [access_compat:error] [pid 2473:tid 140411624429312] [client 149.22.83.198:61225] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:06.475095 2026] [access_compat:error] [pid 17965:tid 140411666392832] [client 149.22.83.198:61226] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:07.555501 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:46036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVB-82sZHvlq4xgHrH8wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:20:12.355318 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:46052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVDEBd0UqwxWindINstgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:20:15.118832 2026] [access_compat:error] [pid 1016:tid 140411582465792] [client 149.22.83.198:61451] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:15.120497 2026] [access_compat:error] [pid 1016:tid 140411590858496] [client 149.22.83.198:61452] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:19.211624 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:49068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVE5qmL8PQht4WJFlM8QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:26.268508 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:43484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVGgeiSKl8TjouI-YG1wAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:28.720974 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:43500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVHKBJNF7axNlVR0UBrgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:31.108896 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:43504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVH6BJNF7axNlVR0UBsQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:58.505908 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:51770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVOtCmCSWTlPouqorRAQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:21:05.434942 2026] [:error] [pid 18604:tid 140411733534464] [client 74.7.243.203:57272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVQUBd0UqwxWindINs0QAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:21:08.975642 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:36828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVRK4xEDsg_V3ESNY4UwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:21:11.344098 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:40728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVR9CmCSWTlPouqorREAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:21:14.843449 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:40738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVSgb2qCuy5irgBMjNqQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:22:35.880615 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:40748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVm-82sZHvlq4xgHrIUgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:22:41.027960 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.243.203:36014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVoa4xEDsg_V3ESNY4egAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:22:43.569152 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:53416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVozarLhPAjZGI1b2zfQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:23:03.479227 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:53430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVt6BJNF7axNlVR0UB6QAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:05.947650 2026] [:error] [pid 18604:tid 140411599251200] [client 74.7.243.203:55986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVuUBd0UqwxWindINtKAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:08.371715 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:55998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVvKBJNF7axNlVR0UB6wAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:09.651617 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.203:56006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVvat8Nd0UC_OcbVG0RQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:10.815559 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:47708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVvq4xEDsg_V3ESNY4jQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:12.117590 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.203:47714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVwK4xEDsg_V3ESNY4jgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:13.465052 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:47726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVwUBd0UqwxWindINtMgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:14.621999 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:47730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVwjarLhPAjZGI1b2zgwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:15.973433 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.203:47742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVw6t8Nd0UC_OcbVG0TQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:17.177675 2026] [:error] [pid 1731:tid 140411658000128] [client 74.7.243.203:47756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVxQb2qCuy5irgBMjNvgAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:19.441677 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:47770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVxgb2qCuy5irgBMjNvwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:20.755483 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVyO82sZHvlq4xgHrIWgAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:22.051404 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:47752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVyjarLhPAjZGI1b2zhAAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:23.402861 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:47754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVy9CmCSWTlPouqorRQQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:24.753769 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:47768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVzJqmL8PQht4WJFlNDwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:26.015438 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:47784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVzgeiSKl8TjouI-YHCgAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:27.507096 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:47794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVzweiSKl8TjouI-YHCwAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:28.850859 2026] [:error] [pid 18604:tid 140411674785536] [client 74.7.243.203:47806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV0EBd0UqwxWindINtRQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:30.035521 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.243.203:49080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV0q4xEDsg_V3ESNY4kQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:31.377645 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.243.203:49082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV0wb2qCuy5irgBMjNwQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:32.717682 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:49098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV1KBJNF7axNlVR0UB9AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:33.945503 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:49112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV1aBJNF7axNlVR0UB9wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:36.351498 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:49122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV2K4xEDsg_V3ESNY4lAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:37.671455 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:49128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV2ZqmL8PQht4WJFlNEgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:38.994291 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:49142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV2u82sZHvlq4xgHrIYgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:40.363333 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:32994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV3Kt8Nd0UC_OcbVG0YQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:41.768232 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:32998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV3TarLhPAjZGI1b2ziAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:43.083395 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:33006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV35qmL8PQht4WJFlNEwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:44.360018 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:33022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV4Ab2qCuy5irgBMjNwwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:46.639852 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:33028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV4q4xEDsg_V3ESNY4mgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:47.926511 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:33042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV4zarLhPAjZGI1b2ziQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:50.180657 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:33058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV5tCmCSWTlPouqorRSQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:51.523120 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:47196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV59CmCSWTlPouqorRSgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:52.707521 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.243.203:47198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV6O82sZHvlq4xgHrIZQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:53.915206 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.203:47204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV6a4xEDsg_V3ESNY4mwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:57.146750 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:47214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV7dCmCSWTlPouqorRTAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:57.254832 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.228.16:33556] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablV7dCmCSWTlPouqorRTQAAAM4"]
[Tue Mar 17 10:23:58.459685 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:47224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV7u82sZHvlq4xgHrIagAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:59.798258 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.203:47232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV764xEDsg_V3ESNY4pQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:01.142191 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:38652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV8e82sZHvlq4xgHrIawAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:04.077143 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:38656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV8tCmCSWTlPouqorRTwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:06.669827 2026] [:error] [pid 18709:tid 140411641214720] [client 74.7.243.203:38666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV9jarLhPAjZGI1b2zjwAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:07.985906 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:38678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV90Bd0UqwxWindINtaQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:09.331981 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:38692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV-e82sZHvlq4xgHrIbQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:11.623385 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:44696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV-weiSKl8TjouI-YHFgAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:13.039222 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:44708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV_aBJNF7axNlVR0UCAwAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:14.383494 2026] [:error] [pid 1731:tid 140411616036608] [client 74.7.243.203:44720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV_gb2qCuy5irgBMjNzQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:15.698394 2026] [:error] [pid 18709:tid 140411590858496] [client 74.7.244.31:55606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablV_zarLhPAjZGI1b2zkQAAA5I"]
[Tue Mar 17 10:24:16.833425 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:44730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWAAeiSKl8TjouI-YHGAAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:18.202811 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWAq4xEDsg_V3ESNY4qQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:19.501457 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:44758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWA9CmCSWTlPouqorRVAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:20.673393 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:39146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWBAeiSKl8TjouI-YHGgAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:22.018039 2026] [:error] [pid 18604:tid 140411666392832] [client 74.7.243.203:39162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWBkBd0UqwxWindINtcwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:23.374734 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:39170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWB6BJNF7axNlVR0UCBgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:25.912495 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:39180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWCQb2qCuy5irgBMjN0AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:27.328206 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:39194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWCweiSKl8TjouI-YHGwAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:29.602738 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.243.203:39198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWDK4xEDsg_V3ESNY4rAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:30.915541 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:36200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWDqt8Nd0UC_OcbVG0jwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:33.875420 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:36216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWETarLhPAjZGI1b2zlgAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:35.162660 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:36222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWE-82sZHvlq4xgHrIcwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:36.385889 2026] [:error] [pid 18604:tid 140411674785536] [client 74.7.243.203:36234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWFEBd0UqwxWindINtdgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:37.725385 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.203:36238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWFa4xEDsg_V3ESNY4rQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:38.887562 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:36250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWFqBJNF7axNlVR0UCCQAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:57.975701 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:33708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWKdCmCSWTlPouqorRbgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:00.403193 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWLJqmL8PQht4WJFlNUAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:01.913091 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:52482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWLe82sZHvlq4xgHrIeQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:03.927622 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:52496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWL-82sZHvlq4xgHrIegAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:15.470334 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:52502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWO5qmL8PQht4WJFlNaQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:47.199628 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:51544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWW0Bd0UqwxWindINtnQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:48.460499 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:48166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWXO82sZHvlq4xgHrIfwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:25:54.098120 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:48178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWYgb2qCuy5irgBMjOEQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:56.563096 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:50750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWZO82sZHvlq4xgHrIgQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:57.349910 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:56100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWZZqmL8PQht4WJFlNkAAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:26:44.235207 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:44190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWlKBJNF7axNlVR0UCkAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:28:22.502050 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:46402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablW9qBJNF7axNlVR0UC7QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:28:26.234037 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:45918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablW-u82sZHvlq4xgHrIlQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:28:53.983084 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:45920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXFa4xEDsg_V3ESNY5EAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:29:00.631651 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:44026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXHNCmCSWTlPouqorRogAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:29:01.981634 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:60618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXHZqmL8PQht4WJFlNpgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:29:09.281477 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:60632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXJK4xEDsg_V3ESNY5GgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:29:16.423167 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.244.31:54618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablXLEBd0UqwxWindINtygAAA0w"]
[Tue Mar 17 10:29:22.515762 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:55142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXMgb2qCuy5irgBMjOZwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:29:23.814725 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:54374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXM6t8Nd0UC_OcbVG0ugAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:29:24.965830 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.243.203:54378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXNDarLhPAjZGI1b2z1QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:29:37.418154 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:54382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXQZqmL8PQht4WJFlNvQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:29:42.083566 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:34406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXRqt8Nd0UC_OcbVG0yAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:30:09.116118 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:40338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXYaBJNF7axNlVR0UDCQAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:24.278027 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:48032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXcK4xEDsg_V3ESNY5NwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:30:32.314328 2026] [:error] [pid 18604:tid 140411708356352] [client 74.7.243.203:56814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXeEBd0UqwxWindINt3AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:33.599540 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:46246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXee82sZHvlq4xgHrI1wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:35.597025 2026] [:error] [pid 1731:tid 140411658000128] [client 74.7.243.203:46260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXegb2qCuy5irgBMjObwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:37.153264 2026] [:error] [pid 1731:tid 140411582465792] [client 74.7.243.203:46272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXfQb2qCuy5irgBMjOcAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:38.343752 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:46278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXfqBJNF7axNlVR0UDDwAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:39.654618 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:46286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXf6BJNF7axNlVR0UDEQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:40.846337 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:56202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXgK4xEDsg_V3ESNY5PAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:42.214431 2026] [:error] [pid 18709:tid 140411699963648] [client 74.7.243.203:56216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXgjarLhPAjZGI1b2z4wAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:46.999144 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.243.203:56226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXhgb2qCuy5irgBMjOeQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:48.328791 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:56238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXiO82sZHvlq4xgHrI4wAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:49.485872 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:56244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXiQeiSKl8TjouI-YHqQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:50.807283 2026] [:error] [pid 18604:tid 140411683178240] [client 74.7.243.203:38100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXikBd0UqwxWindINt3wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:51.998261 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:38110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXizarLhPAjZGI1b2z5QAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:53.335180 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:38124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXjdCmCSWTlPouqorRsAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:55.657179 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:38128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXj-82sZHvlq4xgHrI6wAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:10.627855 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.228.16:60402] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablXngb2qCuy5irgBMjOfAAAAEA"]
[Tue Mar 17 10:31:18.191733 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:38130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXpgeiSKl8TjouI-YHugAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:21.538892 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:58656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXqdCmCSWTlPouqorRzAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:22.836230 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.203:58112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXqq4xEDsg_V3ESNY5RQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:24.151647 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:58124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXrKBJNF7axNlVR0UDGAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:25.475288 2026] [:error] [pid 18604:tid 140411674785536] [client 74.7.243.203:58130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXrUBd0UqwxWindINt5AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:26.797381 2026] [:error] [pid 18604:tid 140411708356352] [client 74.7.243.203:58142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXrkBd0UqwxWindINt5gAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:29.022329 2026] [:error] [pid 18604:tid 140411658000128] [client 74.7.243.203:58144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXsUBd0UqwxWindINt6QAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:31.766265 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:50370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXs6BJNF7axNlVR0UDGgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:35.255771 2026] [:error] [pid 18709:tid 140411708356352] [client 74.7.243.203:50384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXtzarLhPAjZGI1b2z7wAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:36.590139 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:50390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXuAeiSKl8TjouI-YHuwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:37.872324 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:50396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXuQeiSKl8TjouI-YHvAAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:39.134929 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:50398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXu5qmL8PQht4WJFlN2AAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:41.567157 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:44124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXvZqmL8PQht4WJFlN3AAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:42.808339 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:44138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXvqBJNF7axNlVR0UDGwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:43.991831 2026] [:error] [pid 17965:tid 140411590858496] [client 74.7.243.203:44142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXv6t8Nd0UC_OcbVG02gAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:45.350813 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:44146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXwat8Nd0UC_OcbVG02wAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:46.636737 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.243.203:44158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXwkBd0UqwxWindINt6wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:50.061767 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:44164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXxqt8Nd0UC_OcbVG04wAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:51.413252 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:45592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXx6t8Nd0UC_OcbVG05QAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:53.815111 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:45596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXyTarLhPAjZGI1b2z8wAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:55.065862 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:45598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXy0Bd0UqwxWindINt7AAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:56.388397 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:45602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXzK4xEDsg_V3ESNY5SQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:57.495076 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:45604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXze82sZHvlq4xgHrJGQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:58.729822 2026] [:error] [pid 18604:tid 140411582465792] [client 74.7.243.203:45614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXzkBd0UqwxWindINt7QAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:00.059201 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:45622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX0KBJNF7axNlVR0UDHwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:04.654530 2026] [:error] [pid 1731:tid 140411699963648] [client 74.7.243.203:44016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX1Ab2qCuy5irgBMjOiQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:05.942893 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:44026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX1QeiSKl8TjouI-YHwQAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:08.290014 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:44030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX2DarLhPAjZGI1b2z9gAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:14.920806 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.203:44040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX3qt8Nd0UC_OcbVG1EAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:17.303025 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:54696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX4a4xEDsg_V3ESNY5YgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:18.566738 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:54712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX4qBJNF7axNlVR0UDIwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:19.896070 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:54716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX45qmL8PQht4WJFlN5QAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:21.257653 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.243.203:40672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX5UBd0UqwxWindINt-QAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:26.714508 2026] [:error] [pid 18709:tid 140411649607424] [client 74.7.243.203:40678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX6jarLhPAjZGI1b20BAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:28.034717 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:40688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX7K4xEDsg_V3ESNY5ZQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:29.350596 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:40690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX7a4xEDsg_V3ESNY5ZgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:44.251270 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:35794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX_O82sZHvlq4xgHrJLwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:15.396497 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.243.203:34408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYGwb2qCuy5irgBMjOrgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:22.391530 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:56640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYIpqmL8PQht4WJFlOBQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:23.709071 2026] [:error] [pid 18604:tid 140411666392832] [client 74.7.243.203:35700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYI0Bd0UqwxWindINuBQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:33:25.015102 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.241.46:46244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYJZqmL8PQht4WJFlOCAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:36.017504 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:48232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYMKBJNF7axNlVR0UDPQAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:53.844678 2026] [:error] [pid 18604:tid 140411666392832] [client 74.7.241.46:56276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYQUBd0UqwxWindINuGQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:34:08.427019 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:35716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYUKt8Nd0UC_OcbVG1oQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:34:09.726840 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:33356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYUdCmCSWTlPouqorSOQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:34:17.063925 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.244.31:35690] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablYWdCmCSWTlPouqorSOgAAANE"]
[Tue Mar 17 10:34:22.515203 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.46:51646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYXgeiSKl8TjouI-YH8gAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:34:41.380976 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:34968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYcUBd0UqwxWindINuQQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:34:46.711314 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:33888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYdqBJNF7axNlVR0UDXQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:34:51.580972 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:39460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYeweiSKl8TjouI-YIAwAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:35:02.089825 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.46:43720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYhqBJNF7axNlVR0UDawAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:35:21.308107 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:41488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYma4xEDsg_V3ESNY5oAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:35:24.851192 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:58130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYnJqmL8PQht4WJFlOHgAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:35:26.193999 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.243.203:58146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYntCmCSWTlPouqorSRgAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:35:36.550655 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:58148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYqKBJNF7axNlVR0UDeQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:35:41.103033 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:55524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYrAb2qCuy5irgBMjO0gAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:36:09.977442 2026] [:error] [pid 18709:tid 140411666392832] [client 74.7.228.16:34524] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablYyTarLhPAjZGI1b20aQAAA4k"]
[Tue Mar 17 10:36:40.001266 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.241.46:33614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY5zarLhPAjZGI1b20hQAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:51.575531 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:42328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY89CmCSWTlPouqorSkAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:53.070668 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:56966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY9DarLhPAjZGI1b20hwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:54.402526 2026] [:error] [pid 18604:tid 140411574073088] [client 74.7.243.203:56974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY9kBd0UqwxWindINuawAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:57.411219 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:56988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY-Kt8Nd0UC_OcbVG1vQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:58.704147 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:57000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY-u82sZHvlq4xgHrJvQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:00.059276 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:57016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY_Ab2qCuy5irgBMjO3wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:01.440310 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:34348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY_Qb2qCuy5irgBMjO4AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:07.299374 2026] [:error] [pid 18709:tid 140411582465792] [client 74.7.243.203:34352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZAzarLhPAjZGI1b20jAAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:08.623065 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:34366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZBKBJNF7axNlVR0UDhQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:10.983457 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.243.203:34376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZBtCmCSWTlPouqorSlAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:12.356762 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:39774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZCO82sZHvlq4xgHrJwAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:14.615073 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZCpqmL8PQht4WJFlOMwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:15.887472 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:39796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZCwb2qCuy5irgBMjO4gAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:17.096277 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:39806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZDQeiSKl8TjouI-YIFwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:19.424188 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:39820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZD6BJNF7axNlVR0UDiQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:20.751630 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:45026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZEKt8Nd0UC_OcbVG1wQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:25.819961 2026] [:error] [pid 1731:tid 140411607643904] [client 74.7.243.203:45030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZFQb2qCuy5irgBMjO5wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:28.103177 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.203:45040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZF6t8Nd0UC_OcbVG1wgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:29.958597 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.243.203:45056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZGat8Nd0UC_OcbVG1xQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:31.323182 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:58280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZG64xEDsg_V3ESNY53gAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:32.601608 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:58290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZHK4xEDsg_V3ESNY54QAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:36.057140 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:58300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZIDarLhPAjZGI1b20kgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:37.350659 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.243.203:58310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZIat8Nd0UC_OcbVG1yQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:48.208407 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:58326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZLO82sZHvlq4xgHrJ0AAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:58.120960 2026] [:error] [pid 18709:tid 140411666392832] [client 74.7.243.203:50858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZNjarLhPAjZGI1b20oAAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:59.478382 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.243.203:45042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZNzarLhPAjZGI1b20ogAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:00.599024 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:42156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZOO82sZHvlq4xgHrJ0gAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:01.991870 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:42168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZOaBJNF7axNlVR0UDkQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:07.215423 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:42184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZP9CmCSWTlPouqorSogAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:08.579693 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:42186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZQJqmL8PQht4WJFlOPQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:09.002702 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.46:59728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZQa4xEDsg_V3ESNY6BwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:38:09.899335 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:42194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZQa4xEDsg_V3ESNY6CAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:13.351560 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:51156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZRat8Nd0UC_OcbVG10AAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:14.716700 2026] [:error] [pid 18709:tid 140411599251200] [client 74.7.243.203:51162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZRjarLhPAjZGI1b20pQAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:17.111783 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:51164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZSQb2qCuy5irgBMjO9AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:58.277265 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:51172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZcgb2qCuy5irgBMjPGwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:02.149629 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:57114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZdu82sZHvlq4xgHrJ6gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:09.500858 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:43998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZfa4xEDsg_V3ESNY6QwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:39:24.523198 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:39660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZjDarLhPAjZGI1b20wwAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:25.839427 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.243.203:34160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZjat8Nd0UC_OcbVG17QAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:39:31.924484 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:34176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZkpqmL8PQht4WJFlORwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:39:33.435669 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:56304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZlUBd0UqwxWindINu5AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:48.057793 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:56320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZpKBJNF7axNlVR0UDqAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:39:49.390327 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:37334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZpa4xEDsg_V3ESNY6TgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:40:17.583554 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:39052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZwa4xEDsg_V3ESNY6dQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:40:44.951170 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.46:36816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ3Kt8Nd0UC_OcbVG2NQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:40:53.851714 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.241.46:55094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ5TarLhPAjZGI1b205QAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:40:56.302017 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.46:48820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ6Kt8Nd0UC_OcbVG2OwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:12.362727 2026] [:error] [pid 18604:tid 140411716749056] [client 74.7.228.16:57404] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablZ-EBd0UqwxWindINu_wAAA0M"]
[Tue Mar 17 10:41:15.472293 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:52748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ-weiSKl8TjouI-YIbwAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:41:21.494767 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:57426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaAe82sZHvlq4xgHrKLQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:41:48.027341 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:60788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaHK4xEDsg_V3ESNY6oAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:49.344433 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:58636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaHaBJNF7axNlVR0UDuwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:51.454858 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:48058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaHweiSKl8TjouI-YIcwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:52.763163 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaIAeiSKl8TjouI-YIdAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:55.133312 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaIweiSKl8TjouI-YIeQAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:57.502391 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaJaBJNF7axNlVR0UDwAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:01.030484 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:48098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaKa4xEDsg_V3ESNY6pgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:03.630459 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:35394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaKzarLhPAjZGI1b20_AAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:04.375053 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:48828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaLO82sZHvlq4xgHrKVwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:42:10.456287 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.243.203:35408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaMqt8Nd0UC_OcbVG2VAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:12.869097 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:56902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaNAb2qCuy5irgBMjPRwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:14.173793 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:56908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaNgb2qCuy5irgBMjPSQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:15.328647 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.203:56922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaN64xEDsg_V3ESNY6qQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:17.793289 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:56930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaOa4xEDsg_V3ESNY6qwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:19.098894 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:56932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaOwb2qCuy5irgBMjPTwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:21.282572 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.243.203:38930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaPNCmCSWTlPouqorTPQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:27.911502 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:38938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaQwb2qCuy5irgBMjPWQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:29.804787 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:38954] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaRdCmCSWTlPouqorTRQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:31.255668 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:43682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaRweiSKl8TjouI-YIhQAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:32.568133 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.243.203:43686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaSO82sZHvlq4xgHrKWgAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:33.937117 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:43696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaSdCmCSWTlPouqorTSwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:35.160071 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:43706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaS-82sZHvlq4xgHrKXgAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:36.502160 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:43710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaTKt8Nd0UC_OcbVG2VwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:39.012031 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:43716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaTat8Nd0UC_OcbVG2WQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:40.552746 2026] [:error] [pid 18604:tid 140411683178240] [client 74.7.243.203:50672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaUEBd0UqwxWindINvIAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:44.083653 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.203:50678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaVK4xEDsg_V3ESNY6sQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:45.491405 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:50688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaVe82sZHvlq4xgHrKZAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:46.890406 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.243.203:50694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaVq4xEDsg_V3ESNY6sgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:53.760973 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.203:50698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaXat8Nd0UC_OcbVG2aQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:55.138853 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:39366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaXweiSKl8TjouI-YIjwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:56.553162 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:39376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaYEBd0UqwxWindINvJwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:58.966991 2026] [:error] [pid 18604:tid 140411699963648] [client 74.7.243.203:39390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaYkBd0UqwxWindINvLAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:01.496138 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:40918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaZKBJNF7axNlVR0UDywAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:05.293218 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:40934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaaaBJNF7axNlVR0UDzgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:08.995926 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:40940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablabDarLhPAjZGI1b21EgAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:12.636781 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:45114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablacAb2qCuy5irgBMjPXwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:13.988291 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:45124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablace82sZHvlq4xgHrKagAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:16.498020 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:45126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abladAeiSKl8TjouI-YIlQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:17.895884 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:45136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablada4xEDsg_V3ESNY6ugAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:19.259012 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.243.203:45152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abladwb2qCuy5irgBMjPYQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:21.818641 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:56940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaeQb2qCuy5irgBMjPYwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:23.168025 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:56950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablae64xEDsg_V3ESNY6vQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:26.366090 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:56958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablafa4xEDsg_V3ESNY6wAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:27.708758 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:56960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaf-82sZHvlq4xgHrKbAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:29.077997 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.243.203:56974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablagat8Nd0UC_OcbVG2hAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:31.515210 2026] [:error] [pid 18604:tid 140411683178240] [client 74.7.243.203:41434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablag0Bd0UqwxWindINvNgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:31.698813 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:46242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablag9CmCSWTlPouqorTggAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:43:32.856223 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:41448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablahJqmL8PQht4WJFlOzgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:34.193021 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:41456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablahgeiSKl8TjouI-YInAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:35.428114 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:41472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablah64xEDsg_V3ESNY6wgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:37.855454 2026] [:error] [pid 18709:tid 140411632822016] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaiTarLhPAjZGI1b21GwAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:41.959302 2026] [:error] [pid 18709:tid 140411599251200] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablajTarLhPAjZGI1b21HwAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:49.397993 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:42706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablalKBJNF7axNlVR0UD1wAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:50.796064 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:55628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaltCmCSWTlPouqorThQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:52.165479 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:55630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablamJqmL8PQht4WJFlO1QAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:44:17.618938 2026] [:error] [pid 18604:tid 140411565680384] [client 74.7.244.31:33160] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablasUBd0UqwxWindINvRQAAA1U"]
[Tue Mar 17 10:44:35.502679 2026] [:error] [pid 18709:tid 140411632822016] [client 74.7.243.203:55632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablawzarLhPAjZGI1b21RAAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:44:36.823153 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:52678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaxO82sZHvlq4xgHrKfQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:44:41.201640 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:35688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaydCmCSWTlPouqorTjQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:44:43.044633 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.243.203:52684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablay0Bd0UqwxWindINvUgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:44.408758 2026] [:error] [pid 1731:tid 140411716749056] [client 74.7.243.203:39444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablazAb2qCuy5irgBMjPgQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:46.811503 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:39456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablazjarLhPAjZGI1b21SgAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:48.610139 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:35688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla0NCmCSWTlPouqorTlAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:44:51.532201 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:39464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla0weiSKl8TjouI-YI4gAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:52.830935 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:42722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla1K4xEDsg_V3ESNY63AAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:55.250572 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:42736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla1-82sZHvlq4xgHrKjQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:56.567497 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:42738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla2O82sZHvlq4xgHrKjgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:57.761245 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:42750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla2Qb2qCuy5irgBMjPggAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:59.093066 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:42762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla29CmCSWTlPouqorTlgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:00.309861 2026] [:error] [pid 18604:tid 140411590858496] [client 74.7.243.203:53136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla3EBd0UqwxWindINvUwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:01.861486 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:53140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla3Qb2qCuy5irgBMjPhAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:04.427979 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:53156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla4Ab2qCuy5irgBMjPhwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:05.828120 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:53166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla4QeiSKl8TjouI-YI5QAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:07.239542 2026] [:error] [pid 18604:tid 140411649607424] [client 74.7.243.203:53178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla40Bd0UqwxWindINvVwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:09.126956 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:53182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla5DarLhPAjZGI1b21UQAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:10.530605 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:37222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla5qBJNF7axNlVR0UD8QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:11.898997 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:37236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla56BJNF7axNlVR0UD9gAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:14.837277 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:37242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla6pqmL8PQht4WJFlO_wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:16.216003 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:37244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla7Ab2qCuy5irgBMjPiwAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:18.503310 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:37256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla7QeiSKl8TjouI-YI6gAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:19.868808 2026] [:error] [pid 18709:tid 140411599251200] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla7zarLhPAjZGI1b21VgAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:20.695766 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:34624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla8JqmL8PQht4WJFlPBQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:45:22.367277 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:52476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla8tCmCSWTlPouqorToQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:23.768557 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:52480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla85qmL8PQht4WJFlPBgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:24.010894 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:52480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla9JqmL8PQht4WJFlPBwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:26.661609 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:52494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla9geiSKl8TjouI-YI8AAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:28.060672 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:52496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla-JqmL8PQht4WJFlPCQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:30.461098 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:52500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla-qBJNF7axNlVR0UECQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:33.186565 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:41708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla_aBJNF7axNlVR0UEDwAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:34.492293 2026] [:error] [pid 18709:tid 140411699963648] [client 74.7.243.203:41716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla_jarLhPAjZGI1b21WwAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:35.923444 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:41722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla_9CmCSWTlPouqorTsAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:37.581662 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:41738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbAQeiSKl8TjouI-YI8QAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:38.948274 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbAqt8Nd0UC_OcbVG25gAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:40.553866 2026] [access_compat:error] [pid 18604:tid 140411674785536] [client 186.33.117.171:62709] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:40.586036 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:59544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbBDarLhPAjZGI1b21XwAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:41.951528 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbBQeiSKl8TjouI-YI8wAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:42.394899 2026] [access_compat:error] [pid 1016:tid 140411548894976] [client 186.33.117.171:56033] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:43.194702 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.243.203:59560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbBwb2qCuy5irgBMjPlQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:44.617810 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.203:59572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCK4xEDsg_V3ESNY6_QAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:44.631523 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:36148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCNCmCSWTlPouqorTvAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:45.823266 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:59578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCdCmCSWTlPouqorTvQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:47.205433 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:59586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCzarLhPAjZGI1b21YwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:47.966276 2026] [access_compat:error] [pid 2325:tid 140411691570944] [client 103.142.0.112:63280] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:49.508192 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.243.203:59592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbDTarLhPAjZGI1b21ZgAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:45:51.600275 2026] [access_compat:error] [pid 2325:tid 140411725141760] [client 103.142.0.112:63289] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:55.766527 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbEtCmCSWTlPouqorTyAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:04.773890 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.243.203:47498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbHNCmCSWTlPouqorT2AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:46:07.223623 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.46:58040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbH9CmCSWTlPouqorT2wAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:12.441532 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.228.16:34608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablbJO82sZHvlq4xgHrKqwAAAoc"]
[Tue Mar 17 10:46:36.573915 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:57810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbPJqmL8PQht4WJFlPLQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:46:37.984735 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:50980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbPe82sZHvlq4xgHrKtgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:43.939095 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:50986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbQ-82sZHvlq4xgHrKvQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:55.003086 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:57230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbT6t8Nd0UC_OcbVG3BAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:47:01.101269 2026] [access_compat:error] [pid 18709:tid 140411666392832] [client 223.165.69.56:61247] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:01.102250 2026] [access_compat:error] [pid 18709:tid 140411741927168] [client 223.165.69.56:61246] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:05.141543 2026] [:error] [pid 18709:tid 140411632822016] [client 74.7.241.46:57224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbWTarLhPAjZGI1b21oAAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:47:07.595827 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:59282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbWweiSKl8TjouI-YJGQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:47:08.599266 2026] [access_compat:error] [pid 1731:tid 140411658000128] [client 223.165.69.56:61471] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:08.601675 2026] [access_compat:error] [pid 11293:tid 140411548894976] [client 223.165.69.56:61472] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:09.011981 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:38282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbXQb2qCuy5irgBMjPtwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:47:16.079344 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:38732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbZNCmCSWTlPouqorT9gAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:47:47.574599 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:38748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbgwb2qCuy5irgBMjP0wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:47:54.294635 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:39170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbigeiSKl8TjouI-YJMAAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:47:59.509423 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.46:35864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbj64xEDsg_V3ESNY7bAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:48:18.484457 2026] [:error] [pid 18709:tid 140411582465792] [client 74.7.243.203:43318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbojarLhPAjZGI1b21xwAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:48:24.197798 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.243.203:35466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbqKt8Nd0UC_OcbVG3JgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:48:28.905942 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:45756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbrKt8Nd0UC_OcbVG3KwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:48:30.287405 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:39792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbrq4xEDsg_V3ESNY7fQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:48:40.608420 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.241.46:59952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbuDarLhPAjZGI1b21zQAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:48:46.355477 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:52026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbvtCmCSWTlPouqorUEAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:49:03.875021 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:39808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbz6t8Nd0UC_OcbVG3TQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:49:06.339525 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:36990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablb0u82sZHvlq4xgHrLKQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:49:18.083247 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.244.31:45980] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablb3kBd0UqwxWindINwCwAAA08"]
[Tue Mar 17 10:49:34.882840 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.241.46:52038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablb7u82sZHvlq4xgHrLYgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:49:45.304182 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.241.46:37760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablb-a4xEDsg_V3ESNY7mQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:50:04.548269 2026] [:error] [pid 18604:tid 140411582465792] [client 74.7.241.46:47006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcDEBd0UqwxWindINwLgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:50:15.148325 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:36994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcF-82sZHvlq4xgHrLhgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:50:17.440499 2026] [:error] [pid 18604:tid 140411565680384] [client 74.7.243.203:55364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcGUBd0UqwxWindINwNAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:50:22.127594 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcHq4xEDsg_V3ESNY7pQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:50:23.512429 2026] [access_compat:error] [pid 2473:tid 140411666392832] [client 108.136.165.222:59147] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:23.525497 2026] [access_compat:error] [pid 17965:tid 140411699963648] [client 108.136.165.222:59148] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:25.767527 2026] [:error] [pid 18604:tid 140411632822016] [client 74.7.243.203:41098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcIUBd0UqwxWindINwQAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:50:27.895049 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:41112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcI6t8Nd0UC_OcbVG3hQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:50:31.465982 2026] [access_compat:error] [pid 18380:tid 140411733534464] [client 108.136.165.222:59479] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:31.467397 2026] [access_compat:error] [pid 18709:tid 140411674785536] [client 108.136.165.222:59478] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:40.027169 2026] [:error] [pid 18604:tid 140411607643904] [client 74.7.243.203:41118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcMEBd0UqwxWindINwUgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:50:49.159661 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:56140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcOQeiSKl8TjouI-YJYAAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:50:54.894926 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:45930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcPq4xEDsg_V3ESNY7sQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:51:15.819256 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.228.16:33502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablcU6BJNF7axNlVR0UEfQAAAAo"]
[Tue Mar 17 10:51:20.239018 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:45940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcWKt8Nd0UC_OcbVG3zQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:51:25.081561 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:52772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcXat8Nd0UC_OcbVG32QAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:51:27.751504 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:52776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcX9CmCSWTlPouqorUQAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:51:46.056936 2026] [:error] [pid 18604:tid 140411624429312] [client 74.7.243.203:52784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcckBd0UqwxWindINwfQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:51:49.716354 2026] [:error] [pid 18709:tid 140411699963648] [client 74.7.241.46:52846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcdTarLhPAjZGI1b22OwAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:51:51.139127 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:57752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcd6BJNF7axNlVR0UEkAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:52:04.645117 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:38426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablchKBJNF7axNlVR0UEnwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:52:12.891158 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:59462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcjJqmL8PQht4WJFlPxAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:52:20.276662 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:34054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcku82sZHvlq4xgHrLswAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:52:27.375733 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:55482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcm5qmL8PQht4WJFlPzgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:52:41.095371 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.241.46:39438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcqat8Nd0UC_OcbVG4WwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:53:32.694216 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:55488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablc3O82sZHvlq4xgHrMDAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:56:03.790301 2026] [:error] [pid 8298:tid 140411725141760] [client 74.7.241.46:60486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldc5dzf3e7m9lz3ZHOnwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:56:09.367973 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.46:55726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldeb-sgTmmJoPuMdynJAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:12.973958 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:38416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldfHUHeC6oxrTQ0VC2zwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:56:19.342255 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:42758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldg-82sZHvlq4xgHrMOQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:20.627252 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.228.16:36800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abldhAeiSKl8TjouI-YJuQAAA8E"]
[Tue Mar 17 10:56:26.635367 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:55518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldiqt8Nd0UC_OcbVG4zwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:27.991479 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:41026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldi6BJNF7axNlVR0UE6AAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:29.327462 2026] [:error] [pid 8555:tid 140411658000128] [client 74.7.243.203:41038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldjc36KAxay5pmeQfDMgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:30.692561 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.243.203:35408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldjr-sgTmmJoPuMdynKQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:31.958380 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:35420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldjweiSKl8TjouI-YJuwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:34.641330 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:35422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldkqt8Nd0UC_OcbVG40gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:36.022302 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:35428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldlNCmCSWTlPouqorUqQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:37.255182 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:35438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldlQeiSKl8TjouI-YJvQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:38.571054 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldljarLhPAjZGI1b22egAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:41.042014 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:35464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldmdbI7zhHXcabyMUtvgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:42.417127 2026] [:error] [pid 8555:tid 140411741927168] [client 74.7.243.203:46454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldms36KAxay5pmeQfDNwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:43.683458 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:46470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldm-82sZHvlq4xgHrMQgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:44.944053 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:46486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldnKBJNF7axNlVR0UE7gAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:47.489048 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:46500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldnnUHeC6oxrTQ0VC22AAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:50.949153 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:46516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldojarLhPAjZGI1b22gAAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:52.334448 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:55768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldpKt8Nd0UC_OcbVG41QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:54.827953 2026] [:error] [pid 9498:tid 140411540502272] [client 74.7.243.203:55780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldpXdMvNrBGNI28whfwwAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:56.235414 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:55784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldqO82sZHvlq4xgHrMRgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:57.379477 2026] [:error] [pid 8298:tid 140411641214720] [client 74.7.241.46:59980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldqZdzf3e7m9lz3ZHOvAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:57.847500 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:55786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldqQeiSKl8TjouI-YJwgAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:01.115000 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:55796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldrJqmL8PQht4WJFlQDwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:04.227412 2026] [:error] [pid 18709:tid 140411716749056] [client 74.7.243.203:34938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldsDarLhPAjZGI1b22hQAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:05.686948 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:34946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldsa4xEDsg_V3ESNY8JgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:06.949835 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:34956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldsjarLhPAjZGI1b22igAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:09.419830 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:34958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldta4xEDsg_V3ESNY8KgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:11.733599 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.243.203:52846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldtjarLhPAjZGI1b22jgAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:14.191690 2026] [:error] [pid 9498:tid 140411641214720] [client 74.7.243.203:52858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldundMvNrBGNI28whf0gAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:15.539048 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.243.203:52866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablduzarLhPAjZGI1b22jwAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:17.919337 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:52868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldvb-sgTmmJoPuMdynNQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:22.900781 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:52876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldwtCmCSWTlPouqorUrgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:24.221052 2026] [:error] [pid 8555:tid 140411716749056] [client 74.7.243.203:35752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldxM36KAxay5pmeQfDQQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:25.420922 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:35766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldxXUHeC6oxrTQ0VC24wAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:30.095164 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:35780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldyqBJNF7axNlVR0UE_AAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:31.371826 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:50836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldy-82sZHvlq4xgHrMUAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:32.718554 2026] [:error] [pid 9155:tid 140411666392832] [client 74.7.243.203:50840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldzNbI7zhHXcabyMUt3gAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:34.009146 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:50850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldzgeiSKl8TjouI-YJygAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:35.243400 2026] [:error] [pid 8555:tid 140411624429312] [client 74.7.243.203:50866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldz836KAxay5pmeQfDQwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:37.771989 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:50880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld0L-sgTmmJoPuMdynOgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:39.147438 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:50882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld0-82sZHvlq4xgHrMUwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:40.351215 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:37830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld1DarLhPAjZGI1b22lQAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:44.820160 2026] [:error] [pid 8298:tid 140411725141760] [client 74.7.243.203:37844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld2Jdzf3e7m9lz3ZHOzAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:48.421188 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:37860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld3Ab2qCuy5irgBMjQ-gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:49.863414 2026] [:error] [pid 8298:tid 140411616036608] [client 74.7.243.203:37874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld3Zdzf3e7m9lz3ZHOzwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:51.824020 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:59448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld36BJNF7axNlVR0UFAgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:53.323434 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.243.203:59450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld4b-sgTmmJoPuMdynPgAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:54.543181 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:59452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld4u82sZHvlq4xgHrMVwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:55.779757 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:59458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld464xEDsg_V3ESNY8MwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:57.128982 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld5QeiSKl8TjouI-YJ0wAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:59.433899 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld564xEDsg_V3ESNY8NgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:58:03.957916 2026] [:error] [pid 9498:tid 140411557287680] [client 74.7.241.46:35742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld63dMvNrBGNI28whf_QAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:58:06.802335 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:48856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld7tCmCSWTlPouqorUwwAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:10.519534 2026] [:error] [pid 8555:tid 140411616036608] [client 74.7.243.203:48862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld8s36KAxay5pmeQfDUwAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:17.247547 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.243.203:58332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld-b-sgTmmJoPuMdynRgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:58:22.438150 2026] [:error] [pid 18604:tid 140411582465792] [client 74.7.243.203:58346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld_kBd0UqwxWindINw4gAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:58:40.344801 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.243.203:47850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableEEBd0UqwxWindINw9QAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:43.907175 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:60642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableE9CmCSWTlPouqorU6AAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:58:48.479079 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:40112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableGDarLhPAjZGI1b22rAAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:57.759577 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:40114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableIat8Nd0UC_OcbVG49AAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:05.183100 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.241.46:55034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableKZqmL8PQht4WJFlQMQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:59:09.477275 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:46316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableLdCmCSWTlPouqorU8AAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:19.686006 2026] [:error] [pid 8856:tid 140411733534464] [client 74.7.244.31:43928] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ableN3UHeC6oxrTQ0VC3AwAAAcE"]
[Tue Mar 17 10:59:20.783534 2026] [:error] [pid 8856:tid 140411599251200] [client 74.7.241.46:41768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableOHUHeC6oxrTQ0VC3BAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:22.488354 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.241.46:34948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableOqt8Nd0UC_OcbVG5AAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:40.207667 2026] [:error] [pid 8555:tid 140411607643904] [client 74.7.241.46:34954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableTM36KAxay5pmeQfDgwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:59:47.526202 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:52716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableU-82sZHvlq4xgHrMlAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:52.171617 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.241.46:40088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableWKt8Nd0UC_OcbVG5FAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:17.825904 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:52520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablecQeiSKl8TjouI-YJ-wAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:00:31.751318 2026] [:error] [pid 8298:tid 140411691570944] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablef5dzf3e7m9lz3ZHO-wAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:33.179477 2026] [:error] [pid 8555:tid 140411582465792] [client 74.7.243.203:51622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablegc36KAxay5pmeQfDjgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:36.055239 2026] [:error] [pid 9155:tid 140411607643904] [client 74.7.243.203:51624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablehNbI7zhHXcabyMUuQgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:40.747194 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.241.46:41944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableiO82sZHvlq4xgHrM1AAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:41.065536 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:51636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableiat8Nd0UC_OcbVG5JAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:42.965630 2026] [:error] [pid 8856:tid 140411716749056] [client 74.7.243.203:60576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableinUHeC6oxrTQ0VC3GQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:49.143470 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:60584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablekQeiSKl8TjouI-YKBwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:51.876986 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:52064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablekweiSKl8TjouI-YKCgAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:53.263960 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.243.203:52078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablelZqmL8PQht4WJFlQSQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:54.593440 2026] [:error] [pid 8298:tid 140411574073088] [client 74.7.243.203:52090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablelpdzf3e7m9lz3ZHPAAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:57.385609 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:52100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablemTarLhPAjZGI1b226gAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:58.763338 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:52106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablemr-sgTmmJoPuMdynewAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:59.998647 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:52108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablem9CmCSWTlPouqorVEQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:01.427254 2026] [:error] [pid 18604:tid 140411649607424] [client 74.7.243.203:33154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablenUBd0UqwxWindINxUgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:04.103963 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:33156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablen6t8Nd0UC_OcbVG5KQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:05.670004 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:33160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableoQeiSKl8TjouI-YKCwAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:06.934651 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:33176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableoqBJNF7axNlVR0UFRAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:09.559518 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:33188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablepaBJNF7axNlVR0UFTAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:10.879418 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:43186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableptCmCSWTlPouqorVGAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:12.131187 2026] [:error] [pid 8555:tid 140411607643904] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableqM36KAxay5pmeQfDlQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:13.407117 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.46:59226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableqb-sgTmmJoPuMdyniAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:01:14.837282 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:43204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablequ82sZHvlq4xgHrM8QAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:19.412579 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:43212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablerqBJNF7axNlVR0UFVAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:21.396151 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:37452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablesAeiSKl8TjouI-YKDQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:24.187005 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:37468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abletDarLhPAjZGI1b228AAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:26.642429 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:37474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abletq4xEDsg_V3ESNY8agAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:27.183420 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:37774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablet-82sZHvlq4xgHrM_QAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:01:29.097891 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:37490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableuQeiSKl8TjouI-YKDwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:30.417112 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:48350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableuq4xEDsg_V3ESNY8awAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:32.661540 2026] [:error] [pid 8856:tid 140411666392832] [client 74.7.243.203:48360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableu3UHeC6oxrTQ0VC3KAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:37.531063 2026] [:error] [pid 8298:tid 140411725141760] [client 74.7.243.203:48372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablewJdzf3e7m9lz3ZHPEgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:38.987204 2026] [:error] [pid 8298:tid 140411565680384] [client 74.7.243.203:48384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablewpdzf3e7m9lz3ZHPFQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:40.539442 2026] [:error] [pid 9155:tid 140411557287680] [client 74.7.243.203:55058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablexNbI7zhHXcabyMUuXAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:44.062467 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:55070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableyKBJNF7axNlVR0UFXgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:48.366411 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:55072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablezO82sZHvlq4xgHrNBAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:49.731601 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:55080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablezTarLhPAjZGI1b23CwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:52.726072 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.241.46:57912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0DarLhPAjZGI1b23EAAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:01:53.195666 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0b-sgTmmJoPuMdynkQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:54.555345 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:32848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0geiSKl8TjouI-YKEwAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:55.746976 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:32852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0weiSKl8TjouI-YKFQAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:58.027134 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:32858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able1aBJNF7axNlVR0UFYAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:02:03.951414 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:32872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able2zarLhPAjZGI1b23HwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:02:09.759500 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:51968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able4TarLhPAjZGI1b23KwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:17.706688 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:38406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able6XUHeC6oxrTQ0VC3MwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:25.600012 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:38418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able8aBJNF7axNlVR0UFZgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:35.039677 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:42450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able--82sZHvlq4xgHrNGQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:02:36.463868 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able_L-sgTmmJoPuMdynnQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:37.841505 2026] [:error] [pid 8856:tid 140411725141760] [client 74.7.243.203:42448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able_XUHeC6oxrTQ0VC3NQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:40.343505 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:56594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfAAeiSKl8TjouI-YKMgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:02:52.956344 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:42462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfDNCmCSWTlPouqorVMQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:03:39.791114 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:56898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfO64xEDsg_V3ESNY8wgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:03:50.897689 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:42644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfRtCmCSWTlPouqorVRQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:03:54.031473 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:59478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfSqBJNF7axNlVR0UFfQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:03:59.303086 2026] [:error] [pid 9155:tid 140411624429312] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfT9bI7zhHXcabyMUufAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:04:15.707140 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.241.46:34382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfXjarLhPAjZGI1b23wQAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:04:21.429467 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.244.31:50078] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablfZZqmL8PQht4WJFlQlwAAAUU"]
[Tue Mar 17 11:04:43.661140 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:42674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfe64xEDsg_V3ESNY87gAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:04:50.654881 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:56952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfgqBJNF7axNlVR0UFjgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:05:32.107607 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:60900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfrNCmCSWTlPouqorVgwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:06:02.870411 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:58840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfyqBJNF7axNlVR0UF4wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:04.251077 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:52624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfzKBJNF7axNlVR0UF5gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:05.453944 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:52640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfze82sZHvlq4xgHrNWAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:12.759551 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:37652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf1JqmL8PQht4WJFlQ3wAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:26.110935 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.228.16:49584] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablf4r-sgTmmJoPuMdyoFwAAAtA"]
[Tue Mar 17 11:06:27.187201 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:52656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf49CmCSWTlPouqorVowAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:31.944639 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.243.203:56540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf57-sgTmmJoPuMdyoIwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:33.431419 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.46:35142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf6aBJNF7axNlVR0UGBQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:34.327012 2026] [:error] [pid 8856:tid 140411649607424] [client 74.7.243.203:44708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf6nUHeC6oxrTQ0VC3fgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:35.655820 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:44716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf6-82sZHvlq4xgHrNawAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:37.050461 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:44720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf7e82sZHvlq4xgHrNbQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:38.223622 2026] [:error] [pid 9155:tid 140411582465792] [client 74.7.243.203:44722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf7tbI7zhHXcabyMUuowAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:39.574916 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:44736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf7zarLhPAjZGI1b24AQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:40.827737 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:34164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf8DarLhPAjZGI1b24AwAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:41.110687 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:34164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf8TarLhPAjZGI1b24BAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:42.437462 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:34172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf8pqmL8PQht4WJFlQ4AAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:45.660108 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:34176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf9QeiSKl8TjouI-YKdAAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:47.018113 2026] [:error] [pid 8856:tid 140411641214720] [client 74.7.243.203:34184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf93UHeC6oxrTQ0VC3gAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:48.329215 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:34196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf-JqmL8PQht4WJFlQ5AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:49.512943 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:34200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf-dCmCSWTlPouqorVqwAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:53.506018 2026] [:error] [pid 8856:tid 140411582465792] [client 74.7.243.203:41944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf_XUHeC6oxrTQ0VC3hgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:54.859570 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf_q4xEDsg_V3ESNY9LQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:56.043035 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:41968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgAO82sZHvlq4xgHrNcAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:57.398868 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:41978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgAZqmL8PQht4WJFlQ7AAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:58.614826 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:41986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgAtCmCSWTlPouqorVtQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:03.816644 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:41998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgBq4xEDsg_V3ESNY9NAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:05.143171 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:46110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCaBJNF7axNlVR0UGJwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:06.211010 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:49920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCqBJNF7axNlVR0UGKAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:07:06.366431 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCqBJNF7axNlVR0UGKgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:07.874379 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCweiSKl8TjouI-YKdwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:09.203935 2026] [:error] [pid 8856:tid 140411607643904] [client 74.7.243.203:46138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgDXUHeC6oxrTQ0VC3iwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:10.430020 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:34278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgDqBJNF7axNlVR0UGLgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:11.745474 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:34292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgDweiSKl8TjouI-YKegAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:13.003473 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:34296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgEQeiSKl8TjouI-YKfQAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:14.298850 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:34302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgEgeiSKl8TjouI-YKgAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:16.960136 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:34308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgE5qmL8PQht4WJFlQ8AAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:19.242809 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:34310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgFtbI7zhHXcabyMUuxAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:20.547080 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:52192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgGAeiSKl8TjouI-YKiQAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:21.831627 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:52198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgGQeiSKl8TjouI-YKjAAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:24.140075 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:52212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgG5qmL8PQht4WJFlQ8wAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:26.544308 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.203:52218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgHqt8Nd0UC_OcbVG5qQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:28.928683 2026] [:error] [pid 8856:tid 140411641214720] [client 74.7.243.203:52230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgIHUHeC6oxrTQ0VC3kQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:30.240939 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:33820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgIu82sZHvlq4xgHrNggAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:31.399158 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:33824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgI5qmL8PQht4WJFlQ9QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:32.757227 2026] [:error] [pid 8856:tid 140411557287680] [client 74.7.243.203:33832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgJHUHeC6oxrTQ0VC3kgAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:34.158151 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.243.203:33848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgJtCmCSWTlPouqorVwwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:35.347203 2026] [:error] [pid 8856:tid 140411607643904] [client 74.7.243.203:33862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgJ3UHeC6oxrTQ0VC3kwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:38.681390 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:33876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgKjarLhPAjZGI1b24FwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:40.024627 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:33882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgLNbI7zhHXcabyMUvOgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:41.147083 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:54252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgLe82sZHvlq4xgHrNhQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:43.093245 2026] [:error] [pid 18709:tid 140411708356352] [client 74.7.243.203:54256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgLjarLhPAjZGI1b24GAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:44.483310 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:54264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgMKBJNF7axNlVR0UGNgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:45.718813 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:54270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgMZqmL8PQht4WJFlQ_AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:46.904792 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:54274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgMgeiSKl8TjouI-YKlAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:48.238588 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:54290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgNNbI7zhHXcabyMUvawAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:49.419238 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:54304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgNaBJNF7axNlVR0UGOgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:53.324169 2026] [:error] [pid 18709:tid 140411725141760] [client 74.7.243.203:52750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgOTarLhPAjZGI1b24HwAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:54.612802 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:52766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgOqt8Nd0UC_OcbVG5sgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:58.966056 2026] [:error] [pid 8856:tid 140411658000128] [client 74.7.243.203:52770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgPnUHeC6oxrTQ0VC3pQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:59.711268 2026] [:error] [pid 9155:tid 140411666392832] [client 74.7.241.46:43376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgP9bI7zhHXcabyMUviAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:08:00.291125 2026] [:error] [pid 8856:tid 140411674785536] [client 74.7.243.203:35594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgQHUHeC6oxrTQ0VC3pwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:01.691479 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:35606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgQTarLhPAjZGI1b24IgAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:04.256877 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:35608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgRDarLhPAjZGI1b24KQAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:05.521503 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:35616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgRQeiSKl8TjouI-YKngAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:13.632099 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:35626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgTa4xEDsg_V3ESNY9VQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:19.964533 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:57908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgUtbI7zhHXcabyMUvrgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:42.316815 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:46156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgau82sZHvlq4xgHrNpQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:08:43.694936 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:57576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablga-82sZHvlq4xgHrNpwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:47.111420 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.243.203:57592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgb-82sZHvlq4xgHrNrAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:09:21.943324 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.244.31:60398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablgkdY0UrI5A3LftIzregAAAYQ"]
[Tue Mar 17 11:09:23.743591 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgk6t8Nd0UC_OcbVG59AAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:09:27.249432 2026] [:error] [pid 8856:tid 140411607643904] [client 74.7.243.203:38576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgl3UHeC6oxrTQ0VC3zAAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:09:33.936377 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.243.203:38578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgnb-sgTmmJoPuMdypGwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:09:38.491470 2026] [:error] [pid 8856:tid 140411582465792] [client 74.7.243.203:59444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgoXUHeC6oxrTQ0VC30QAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:09:48.827530 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:57076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgrKBJNF7axNlVR0UGZgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:09:50.387533 2026] [:error] [pid 9155:tid 140411674785536] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgrtbI7zhHXcabyMUwCwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:10:09.594472 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.203:54856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgwat8Nd0UC_OcbVG6DwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:10:21.237815 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.241.46:32960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgza4xEDsg_V3ESNY9pwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:10:22.547097 2026] [:error] [pid 9155:tid 140411590858496] [client 74.7.241.46:60214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgztbI7zhHXcabyMUwGwAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:10:51.683093 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.203:35972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablg67-sgTmmJoPuMdypPwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:11:02.586721 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:40634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablg9dCmCSWTlPouqorWoQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:11.563748 2026] [:error] [pid 19125:tid 140411691570944] [client 74.7.241.46:46026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablg_85urE8i_Bs7KBR2vwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:11:35.566920 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.241.46:39212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhF-82sZHvlq4xgHrN7gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:11:40.161673 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:49302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhHKt8Nd0UC_OcbVG6IwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:41.322164 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.243.203:56906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhHdCmCSWTlPouqorWtAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:44.366611 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:56910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhIJqmL8PQht4WJFlRNwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:49.479377 2026] [:error] [pid 19125:tid 140411590858496] [client 74.7.243.203:56920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhJc5urE8i_Bs7KBR2zAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:52.311117 2026] [:error] [pid 8856:tid 140411708356352] [client 74.7.243.203:49528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhKHUHeC6oxrTQ0VC4CgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:53.215131 2026] [:error] [pid 9155:tid 140411616036608] [client 74.7.241.46:39214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhKdbI7zhHXcabyMUwPwAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:58.168122 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.241.46:50536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhLjarLhPAjZGI1b24qwAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:12:04.526638 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:39048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhNNCmCSWTlPouqorWuAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:06.474688 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:39062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhNpqmL8PQht4WJFlRRAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:09.003002 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhOa4xEDsg_V3ESNY9uAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:11.543435 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:36088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhO5qmL8PQht4WJFlRSAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:15.707682 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhPzarLhPAjZGI1b24sQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:16.706327 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.46:33980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhQNY0UrI5A3LftIzsDAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:12:17.299164 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:36112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhQe82sZHvlq4xgHrN_wAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:18.795538 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:36124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhQgeiSKl8TjouI-YK9wAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:21.323156 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.243.203:36126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhRb-sgTmmJoPuMdypTwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:23.181043 2026] [:error] [pid 19675:tid 140411624429312] [client 74.7.243.203:38262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhRyRqLn8Q9FeNKd-_xQAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:42.680574 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.243.203:60966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhWtbI7zhHXcabyMUwRQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:52.418159 2026] [:error] [pid 8856:tid 140411691570944] [client 74.7.243.203:36226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhZHUHeC6oxrTQ0VC4LwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:02.499660 2026] [:error] [pid 19125:tid 140411548894976] [client 74.7.243.203:36252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhbs5urE8i_Bs7KBR24QAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:06.065009 2026] [:error] [pid 19756:tid 140411741927168] [client 74.7.243.203:55920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhcoZy4YGzbZQWu-w98AAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:09.496199 2026] [:error] [pid 8856:tid 140411699963648] [client 74.7.243.203:55936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhdXUHeC6oxrTQ0VC4MwAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:14.941405 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:57148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablheq4xEDsg_V3ESNY9xwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:18.821663 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:57150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhfpqmL8PQht4WJFlRVAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:21.467169 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:36084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhgQeiSKl8TjouI-YLAQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:23.823439 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:36096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhg-82sZHvlq4xgHrOGAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:14:43.440393 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablh0zarLhPAjZGI1b25FgAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:15:09.676277 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.244.31:45506] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablh7aBJNF7axNlVR0UG2wAAAAs"]
[Tue Mar 17 11:15:43.539387 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.241.46:57176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliDzarLhPAjZGI1b25NwAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:16:06.206341 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:37704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliJNCmCSWTlPouqorW7wAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:16:28.016093 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.228.16:46260] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abliPK4xEDsg_V3ESNY-NwAAAgQ"]
[Tue Mar 17 11:16:47.794871 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:44050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliTweiSKl8TjouI-YLPwAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:16:54.426180 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:38864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliVpqmL8PQht4WJFlRZAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:19:31.951794 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:46232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abli86BJNF7axNlVR0UHGQAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:20:09.720454 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.244.31:38338] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abljGZqmL8PQht4WJFlSNgAAAVc"]
[Tue Mar 17 11:20:58.051082 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:52022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljSgeiSKl8TjouI-YL2wAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:21:28.390966 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.228.16:53122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abljaJqmL8PQht4WJFlSQwAAAUA"]
[Tue Mar 17 11:21:44.387260 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:51544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljeKBJNF7axNlVR0UHTAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:21:52.205173 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.241.46:47148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljgKt8Nd0UC_OcbVG6agAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:22:05.343234 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.46:50964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljjaBJNF7axNlVR0UHWAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:22:25.736576 2026] [:error] [pid 9155:tid 140411649607424] [client 74.7.243.203:42820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljodbI7zhHXcabyMUwgAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:28.624490 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:54860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljo64xEDsg_V3ESNY-UQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:31.136381 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:54876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljp7-sgTmmJoPuMdypmAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:45.619852 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:47448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljtTarLhPAjZGI1b25agAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:53.299729 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:34524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljvQeiSKl8TjouI-YMHAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:55.631403 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.203:49398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljv9Y0UrI5A3LftIzs4AAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:57.810959 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:49400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljwb-sgTmmJoPuMdypnAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:10.646000 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.243.203:49402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljzjarLhPAjZGI1b25dQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:18.483517 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.243.203:45776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj1geiSKl8TjouI-YMJQAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:19.802843 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:45788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj16BJNF7axNlVR0UHYAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:21.167895 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:35342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj2TarLhPAjZGI1b25dgAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:23:35.008362 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.243.203:35358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj57-sgTmmJoPuMdypqQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:23:38.434663 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:55804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj6tY0UrI5A3LftIzs6QAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:41.719612 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj7at8Nd0UC_OcbVG6zgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:23:45.175284 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.241.46:45058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj8ZqmL8PQht4WJFlSpAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:23:45.239851 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:54556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj8dbI7zhHXcabyMUwjgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:23:49.975743 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.243.203:54562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj9b-sgTmmJoPuMdyprwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:23:52.466745 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.243.203:44098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj-JqmL8PQht4WJFlSrAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:24:07.987745 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:44108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkB9CmCSWTlPouqorXKgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:24:13.383699 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:54346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkDZqmL8PQht4WJFlSzAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:24:27.874574 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:37726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkG9bI7zhHXcabyMUwoQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:24:29.235242 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.203:42148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkHdY0UrI5A3LftIzs8AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:24:30.450353 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.243.203:60688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkHtCmCSWTlPouqorXLQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:24:41.897893 2026] [:error] [pid 18709:tid 140411582465792] [client 74.7.241.46:45990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkKDarLhPAjZGI1b25kgAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:25:07.923036 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.241.46:50450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkQ9bI7zhHXcabyMUwuwAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:25:12.686996 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.244.31:43238] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablkSL-sgTmmJoPuMdypuwAAAsQ"]
[Tue Mar 17 11:25:56.904172 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:40492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkc5qmL8PQht4WJFlTUgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:26:29.210190 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.228.16:54620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablkldCmCSWTlPouqorXPQAAAMg"]
[Tue Mar 17 11:26:32.710995 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.203:60692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkmNY0UrI5A3LftIztWgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:27:26.959767 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.203:50402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkztY0UrI5A3LftIztjwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:49.485188 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:59850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk5at8Nd0UC_OcbVG7CgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:51.932367 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.203:36300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk59Y0UrI5A3LftIztlgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:53.305364 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.243.203:36308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk6aBJNF7axNlVR0UH2gAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:54.494861 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk6tY0UrI5A3LftIztmAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:56.716072 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:36330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk69Y0UrI5A3LftIztmgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:59.123151 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.203:36332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk79Y0UrI5A3LftIztnQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:01.515095 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:43436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk8dCmCSWTlPouqorXRwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:03.826609 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:43448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk8geiSKl8TjouI-YMrQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:05.253679 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:43462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk9QeiSKl8TjouI-YMsQAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:06.526046 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.243.203:43466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk9qt8Nd0UC_OcbVG7DAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:09.983776 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:43474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk-K4xEDsg_V3ESNY-hQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:11.346061 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:50912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk-9CmCSWTlPouqorXSQAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:12.527006 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:50914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk_NbI7zhHXcabyMUw0QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:13.842346 2026] [:error] [pid 9155:tid 140411624429312] [client 74.7.243.203:50930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk_dbI7zhHXcabyMUw0wAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:15.055577 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.243.203:50946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk_9bI7zhHXcabyMUw1QAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:16.431421 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:50952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAKt8Nd0UC_OcbVG7DwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:17.631388 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:50968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAdbI7zhHXcabyMUw1gAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:18.711095 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.46:51064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAgeiSKl8TjouI-YMxgAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:18.962919 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.203:50974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAr-sgTmmJoPuMdyp0gAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:21.465171 2026] [:error] [pid 9155:tid 140411582465792] [client 74.7.243.203:52724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllBNbI7zhHXcabyMUw2AAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:22.780335 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.203:52726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllBtY0UrI5A3LftIztpQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:27.878383 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:52728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllCtCmCSWTlPouqorXTgAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:30.209870 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:52740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllDqt8Nd0UC_OcbVG7EgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:31.895982 2026] [:error] [pid 9155:tid 140411674785536] [client 74.7.243.203:60660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllD9bI7zhHXcabyMUw7QAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:33.550061 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:60676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllEdbI7zhHXcabyMUw7wAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:34.851314 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.203:60678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllEtY0UrI5A3LftIztrQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:36.159535 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:60684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllFAeiSKl8TjouI-YMywAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:37.528002 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:60698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllFdCmCSWTlPouqorXUAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:38.832199 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.243.203:60714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllFqt8Nd0UC_OcbVG7FAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:41.035358 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:60730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllGZqmL8PQht4WJFlTawAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:42.523645 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:60978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllGtCmCSWTlPouqorXUQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:43.874087 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:60986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllGweiSKl8TjouI-YMzwAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:45.019353 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:60994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllHQeiSKl8TjouI-YM0AAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:46.361193 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllHqBJNF7axNlVR0UH4gAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:47.561025 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:32778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllHweiSKl8TjouI-YM0QAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:48.774684 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.243.203:32786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllIKt8Nd0UC_OcbVG7FgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:50.087232 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:32794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllIjarLhPAjZGI1b25qAAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:52.288589 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:33420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllJDarLhPAjZGI1b25rQAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:54.630775 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:33434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllJtbI7zhHXcabyMUxFQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:55.980870 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllJ9Y0UrI5A3LftIztrgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:57.293812 2026] [:error] [pid 9155:tid 140411691570944] [client 74.7.243.203:33448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllKdbI7zhHXcabyMUxHgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:59.503241 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.243.203:33464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllK64xEDsg_V3ESNY-jAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:00.830173 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.203:52926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllLNY0UrI5A3LftIztrwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:02.565701 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:52932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllLtCmCSWTlPouqorXVAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:04.050409 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:52936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllL64xEDsg_V3ESNY-jQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:05.356661 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:52944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllMaBJNF7axNlVR0UH5gAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:06.564779 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:52952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllMpqmL8PQht4WJFlTcQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:09.145440 2026] [:error] [pid 9155:tid 140411607643904] [client 74.7.243.203:52968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllNdbI7zhHXcabyMUxNQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:10.418553 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.243.203:53120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllNtbI7zhHXcabyMUxOQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:12.688437 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:53122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllONCmCSWTlPouqorXWgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:14.013405 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:53126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllOr-sgTmmJoPuMdyp2gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:15.201041 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:53138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllO9CmCSWTlPouqorXWwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:16.504838 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:53148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllPNCmCSWTlPouqorXXQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:17.695104 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:53150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllPat8Nd0UC_OcbVG7GgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:19.860758 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:53154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllP6BJNF7axNlVR0UH6AAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:21.138217 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:49186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllQat8Nd0UC_OcbVG7GwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:22.299194 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.203:49188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllQtY0UrI5A3LftIztswAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:26.760588 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.243.203:49190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllRqt8Nd0UC_OcbVG7IQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:28.066923 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.203:49200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllSNY0UrI5A3LftIzttAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:29.229707 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.203:49214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllSdY0UrI5A3LftIzttQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:31.499317 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.243.203:48866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllS6t8Nd0UC_OcbVG7IwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:37.194593 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:48880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllUQeiSKl8TjouI-YNAAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:42.479951 2026] [:error] [pid 9155:tid 140411582465792] [client 74.7.241.46:46302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllVtbI7zhHXcabyMUxbgAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:44.999911 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:48894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllWDarLhPAjZGI1b25twAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:47.436883 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:56068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllW64xEDsg_V3ESNY-kgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:57.396327 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:56080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllZZqmL8PQht4WJFlTfQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:30:04.871755 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllbKBJNF7axNlVR0UH8QAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:14.100241 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:59378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablldtbI7zhHXcabyMUxiwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:15.415573 2026] [:error] [pid 9155:tid 140411641214720] [client 74.7.243.203:39968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablld9bI7zhHXcabyMUxjQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:17.121863 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.244.31:35320] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablleQeiSKl8TjouI-YNBgAAA8U"]
[Tue Mar 17 11:30:24.712692 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:39976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllgK4xEDsg_V3ESNY-ngAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:28.104940 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.46:41338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllhNY0UrI5A3LftIzt5gAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:31.751126 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:48514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllh7-sgTmmJoPuMdyp8gAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:35.650483 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.243.203:41256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablli6t8Nd0UC_OcbVG7MAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:36.280974 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.46:46240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablljNY0UrI5A3LftIzt7gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:38.115849 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:41268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablljjarLhPAjZGI1b25xAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:41.717233 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllkb-sgTmmJoPuMdyp9gAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:46.418632 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:50158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablllgeiSKl8TjouI-YNHAAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:48.810377 2026] [:error] [pid 9155:tid 140411716749056] [client 74.7.243.203:50168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllmNbI7zhHXcabyMUxrAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:30:53.250864 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:50172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllnQeiSKl8TjouI-YNIwAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:30:59.421208 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:60990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllo64xEDsg_V3ESNY-tQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:31:03.087358 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:41726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllp7-sgTmmJoPuMdyqBAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:31:06.675026 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:41730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllqpqmL8PQht4WJFlTkAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:31:08.071439 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllrJqmL8PQht4WJFlTkgAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:31:34.039237 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.228.16:35538] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abllxq4xEDsg_V3ESNY-vAAAAgc"]
[Tue Mar 17 11:31:46.415955 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abll0geiSKl8TjouI-YNVAAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:31:50.853498 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.241.46:60140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abll1tbI7zhHXcabyMUxwAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:32:08.171377 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.241.46:43502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abll6JqmL8PQht4WJFlTqQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:32:44.996526 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.203:41754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmDL-sgTmmJoPuMdyqZAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:46.483592 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.243.203:36384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmDq4xEDsg_V3ESNY-xgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:47.727950 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:36386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmDzarLhPAjZGI1b252gAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:49.001402 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.203:36402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmEdY0UrI5A3LftIzuGgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:50.241024 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:41376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmEtbI7zhHXcabyMUxzQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:51.559314 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmEweiSKl8TjouI-YNXgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:52.783493 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.243.203:41392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmFK4xEDsg_V3ESNY-yQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:54.079665 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:41402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmFtCmCSWTlPouqorXkQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:55.238793 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:41406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmF6BJNF7axNlVR0UIOgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:56.553049 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:41412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmGJqmL8PQht4WJFlTrwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:57.869876 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:41428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmGTarLhPAjZGI1b252wAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:59.058607 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:41436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmGweiSKl8TjouI-YNZAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:59.472719 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:36966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmG6BJNF7axNlVR0UIPwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:33:00.338489 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:48994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmHK4xEDsg_V3ESNY-ywAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:01.526744 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.243.203:49000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmHZqmL8PQht4WJFlTsgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:02.916107 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.243.203:49002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmHjarLhPAjZGI1b254AAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:06.458907 2026] [:error] [pid 9155:tid 140411658000128] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmIdbI7zhHXcabyMUx1AAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:07.771281 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:49014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmI9CmCSWTlPouqorXlQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:08.951163 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:49016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmJAeiSKl8TjouI-YNZwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:10.257962 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:55220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmJtCmCSWTlPouqorXlgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:11.364726 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.203:55224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmJ9Y0UrI5A3LftIzuHAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:15.409611 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:55228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmKweiSKl8TjouI-YNbAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:16.711558 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:55230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmLK4xEDsg_V3ESNY-2gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:19.097694 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:55232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmLzarLhPAjZGI1b254wAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:20.266545 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.203:55414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmMNY0UrI5A3LftIzuIQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:21.545657 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.243.203:55424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmMb-sgTmmJoPuMdyqZgAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:22.729692 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:55434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmMtCmCSWTlPouqorXmgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:24.009668 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:55450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmNAeiSKl8TjouI-YNbwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:26.763946 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.46:39368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmNq4xEDsg_V3ESNY-4gAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:33:27.596547 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmN5qmL8PQht4WJFlTvgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:28.911050 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.243.203:55464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmOJqmL8PQht4WJFlTwgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:30.073519 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:51982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmOjarLhPAjZGI1b255wAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:31.419155 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:51996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmO7-sgTmmJoPuMdyqagAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:32.598711 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.203:52008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmPNY0UrI5A3LftIzuJgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:33.947474 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:52020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmPQeiSKl8TjouI-YNcwAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:35.171235 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.203:52036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmP9Y0UrI5A3LftIzuKgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:36.537708 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:52038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmQNbI7zhHXcabyMUx2AAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:37.727010 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:52040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmQdY0UrI5A3LftIzuKwAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:39.047721 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:52044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmQ9bI7zhHXcabyMUx2QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:40.192701 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:50998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmRL-sgTmmJoPuMdyqbgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:41.345855 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:51014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmRdCmCSWTlPouqorXnwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:42.629797 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:51018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmRpqmL8PQht4WJFlT0AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:43.907332 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.243.203:51032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmR7-sgTmmJoPuMdyqcQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:45.221649 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:51036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmSa4xEDsg_V3ESNY-5QAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:49.904969 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:51048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmTa4xEDsg_V3ESNY-6gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:52.099490 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:57370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmTweiSKl8TjouI-YNdgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:53.471548 2026] [:error] [pid 9155:tid 140411716749056] [client 74.7.243.203:57376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmUdbI7zhHXcabyMUx4QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:55.875144 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:57380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmU9bI7zhHXcabyMUx5gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:57.275344 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:57386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmVZqmL8PQht4WJFlT5AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:58.597150 2026] [:error] [pid 9155:tid 140411641214720] [client 74.7.243.203:57392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmVtbI7zhHXcabyMUx6gAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:01.034154 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:57400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmWZqmL8PQht4WJFlT7AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:02.419007 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:33574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmWq4xEDsg_V3ESNY-7AAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:03.763799 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:33578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmW64xEDsg_V3ESNY-7gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:05.128744 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:33586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmXQeiSKl8TjouI-YNeAAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:06.540537 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:33598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmXgeiSKl8TjouI-YNeQAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:07.876229 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmX6BJNF7axNlVR0UIRAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:09.185383 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:33608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmYTarLhPAjZGI1b257QAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:11.522905 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:39976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmYzarLhPAjZGI1b258gAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:12.847196 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.203:39988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmZK4xEDsg_V3ESNY-8QAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:16.167708 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.243.203:39990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmaDarLhPAjZGI1b259QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:17.447072 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:39992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmaQeiSKl8TjouI-YNfgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:18.733478 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:39996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmapqmL8PQht4WJFlUAAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:20.029471 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:40004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmbKBJNF7axNlVR0UIRQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:21.203101 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:57730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmbat8Nd0UC_OcbVG7uAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:22.568181 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:57742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmbtY0UrI5A3LftIzuOAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:24.811078 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:57748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmcKBJNF7axNlVR0UISAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:28.237792 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmdKBJNF7axNlVR0UITAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:29.547492 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmdat8Nd0UC_OcbVG7uwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:32.295700 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:55122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmeK4xEDsg_V3ESNY-9QAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:33.634611 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:55126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmeZqmL8PQht4WJFlUEQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:35.995353 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.243.203:55140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablme6BJNF7axNlVR0UITgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:37.368899 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.243.203:55154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmfdCmCSWTlPouqorXyQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:44.807951 2026] [access_compat:error] [pid 17965:tid 140411733534464] [client 203.175.125.130:32796] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Tue Mar 17 11:34:45.981904 2026] [access_compat:error] [pid 2473:tid 140411548894976] [client 203.175.125.130:32802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/txets.php
[Tue Mar 17 11:34:47.889928 2026] [access_compat:error] [pid 2473:tid 140411674785536] [client 203.175.125.130:32802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/txets.php
[Tue Mar 17 11:34:48.282806 2026] [access_compat:error] [pid 2473:tid 140411725141760] [client 203.175.125.130:32802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/txets.php
[Tue Mar 17 11:34:51.894735 2026] [access_compat:error] [pid 17965:tid 140411666392832] [client 203.175.125.130:60958] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/schallfuns.php
[Tue Mar 17 11:34:52.286281 2026] [access_compat:error] [pid 17965:tid 140411658000128] [client 203.175.125.130:60958] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/postnews.php
[Tue Mar 17 11:34:52.674704 2026] [access_compat:error] [pid 17965:tid 140411557287680] [client 203.175.125.130:60958] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/postnews.php
[Tue Mar 17 11:34:54.525065 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.241.46:40448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmjpqmL8PQht4WJFlULAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:35:00.679010 2026] [access_compat:error] [pid 7437:tid 140411574073088] [client 203.175.125.130:33034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/postnews.php
[Tue Mar 17 11:35:01.069264 2026] [access_compat:error] [pid 7437:tid 140411658000128] [client 203.175.125.130:33034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/postnews.php
[Tue Mar 17 11:35:18.954457 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.244.31:40958] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablmppqmL8PQht4WJFlUNQAAAVc"]
[Tue Mar 17 11:35:28.443207 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.241.46:43652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmsNbI7zhHXcabyMUyGgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:35:56.839498 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:37048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmzKBJNF7axNlVR0UIiQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:36:34.075496 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.228.16:38476] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablm8r-sgTmmJoPuMdyqsAAAAsI"]
[Tue Mar 17 11:36:57.010950 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:42560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnCdCmCSWTlPouqorYOAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:37:27.799453 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.46:43360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnJ9Y0UrI5A3LftIzuwgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:37:31.017064 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnK9CmCSWTlPouqorYWQAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:37:40.884908 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:40546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnNKBJNF7axNlVR0UIvgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:37:58.408898 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.203:41488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnRr-sgTmmJoPuMdyq6gAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:38:12.691480 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:35422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnVNbI7zhHXcabyMUyTgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:38:15.082531 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.203:45996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnV64xEDsg_V3ESNY_OQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:38:55.640299 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.241.46:56472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnfzarLhPAjZGI1b26gAAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:39:50.786124 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:38800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablntgeiSKl8TjouI-YOOgAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:39:52.122099 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.203:50508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnuK4xEDsg_V3ESNY_VwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:40:15.355683 2026] [:error] [pid 9155:tid 140411699963648] [client 74.7.243.203:50520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnz9bI7zhHXcabyMUyfgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:40:22.025706 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:39750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln1qBJNF7axNlVR0UI8wAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:40:29.312394 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.46:45656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln3dCmCSWTlPouqorY2AAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:40:30.172231 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:48630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln3qBJNF7axNlVR0UI_QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:40:31.534177 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:44806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln3weiSKl8TjouI-YORgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:40:31.927642 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.46:43938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln39Y0UrI5A3LftIzvIQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:40:34.888069 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:44810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln4jarLhPAjZGI1b26lgAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:03.171251 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:44820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln_weiSKl8TjouI-YOZAAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:41:07.570210 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:41580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloA6t8Nd0UC_OcbVG8ngAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:41:16.967548 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:41594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloDNbI7zhHXcabyMUymQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:41:19.373643 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:36338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloDweiSKl8TjouI-YOaAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:41:20.718361 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:50006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloEL-sgTmmJoPuMdyrGwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:41:22.051109 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:50012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloEtbI7zhHXcabyMUymwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:28.639465 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:50022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloGJqmL8PQht4WJFlUnQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:34.847276 2026] [:error] [pid 18709:tid 140411725141760] [client 74.7.228.16:52788] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abloHjarLhPAjZGI1b26sAAAA4I"]
[Tue Mar 17 11:41:42.583440 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:51644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloJgeiSKl8TjouI-YOcwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:47.199660 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:49884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloK5qmL8PQht4WJFlUpgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:52.468305 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.243.203:49888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloMDarLhPAjZGI1b26twAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:42:10.059214 2026] [:error] [pid 2160:tid 140411733534464] [client 74.7.241.46:40130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloQjjrdei6i7MVRTDQQAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:42:13.663756 2026] [:error] [pid 2282:tid 140411548894976] [client 74.7.241.46:51128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloRakMvtOYthfEFiXFqwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:43:06.755100 2026] [:error] [pid 2742:tid 140411582465792] [client 74.7.241.46:51134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloeqWl1W69SFJ8FcxjAAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:43:10.223783 2026] [:error] [pid 9155:tid 140411708356352] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloftbI7zhHXcabyMUyvAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:43:11.549129 2026] [:error] [pid 9155:tid 140411708356352] [client 74.7.241.46:56588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablof9bI7zhHXcabyMUyvQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:43:36.387107 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.46:56590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablomK4xEDsg_V3ESNY_jAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:43:55.463169 2026] [:error] [pid 2742:tid 140411582465792] [client 74.7.243.203:60656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloq6Wl1W69SFJ8FcxjMQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:47:11.227578 2026] [:error] [pid 9155:tid 140411708356352] [client 74.7.228.16:39560] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablpb9bI7zhHXcabyMUy7QAAAkQ"]
[Tue Mar 17 11:48:31.910941 2026] [:error] [pid 2438:tid 140411540502272] [client 74.7.243.203:50642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablpvwAK_Njv7NSBJQL52QAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:51:39.718949 2026] [:error] [pid 2018:tid 140411565680384] [client 74.7.244.31:40560] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablqe8vohlba1G1UJvs9PQAAAFU"]
[Tue Mar 17 11:51:56.039150 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.46:52940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablqjK4xEDsg_V3ESNY_1wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:52:40.658766 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.228.16:34510] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablquAeiSKl8TjouI-YO9wAAA9g"]
[Tue Mar 17 11:55:02.510360 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:36758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablrRq4xEDsg_V3ESNY_4gAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:55:32.302258 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.243.203:38824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablrZKt8Nd0UC_OcbVG9fQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:57:47.135754 2026] [:error] [pid 2160:tid 140411582465792] [client 74.7.228.16:34464] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablr6zjrdei6i7MVRTDQuAAAARM"]
[Tue Mar 17 11:59:45.480900 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.46:35604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsYRj0p0SRWAqcjGFuGQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:00:57.175973 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.203:50846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsqdY0UrI5A3LftIzwQAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:01:01.257699 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:55590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsrat8Nd0UC_OcbVG9vwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:18.767171 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.243.203:49240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsvqt8Nd0UC_OcbVG90QAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:21.751338 2026] [:error] [pid 9155:tid 140411649607424] [client 74.7.243.203:48522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablswdbI7zhHXcabyMUzlAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:31.288411 2026] [:error] [pid 9155:tid 140411649607424] [client 74.7.243.203:35872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsy9bI7zhHXcabyMUzpwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:45.930614 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:54778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls2dCmCSWTlPouqorZeQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:01:48.388638 2026] [:error] [pid 2160:tid 140411741927168] [client 74.7.243.203:50920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls3Djrdei6i7MVRTDQ4wAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:01:49.663610 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.243.203:50928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls3Rj0p0SRWAqcjGFuJQAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:02:02.710348 2026] [:error] [pid 2160:tid 140411574073088] [client 74.7.244.31:55772] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abls6jjrdei6i7MVRTDQ5gAAARQ"]
[Tue Mar 17 12:02:06.898948 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.203:40380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls7Rj0p0SRWAqcjGFuMwAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:09.464276 2026] [:error] [pid 2160:tid 140411590858496] [client 74.7.243.203:45000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls8Tjrdei6i7MVRTDQ6QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:49.074598 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:54514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltGat8Nd0UC_OcbVG-AQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:51.543429 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.243.203:47944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltG7-sgTmmJoPuMdysBAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:52.853031 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:47956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltHKt8Nd0UC_OcbVG-AgAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:55.163009 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:47964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltH9CmCSWTlPouqorZgQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:07.440756 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.243.203:47980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltK6t8Nd0UC_OcbVG-EQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:10.803624 2026] [:error] [pid 9155:tid 140411624429312] [client 74.7.243.203:33928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltLtbI7zhHXcabyMUzxQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:13.232173 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:45092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltMdCmCSWTlPouqorZhQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:14.516875 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.203:45094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltMtY0UrI5A3LftIzwTwAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:15.823209 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:45096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltMweiSKl8TjouI-YPlgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:16.982500 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.203:45102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltNNY0UrI5A3LftIzwUAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:18.387551 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.203:45114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltNtY0UrI5A3LftIzwUQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:22.373670 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:45130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltOgeiSKl8TjouI-YPmQAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:26.929236 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:48134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltPtCmCSWTlPouqorZjAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:28.267329 2026] [:error] [pid 9155:tid 140411674785536] [client 74.7.243.203:48138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltQNbI7zhHXcabyMUzxgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:29.582029 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:48152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltQdbI7zhHXcabyMUzxwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:35.264043 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:46342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltRweiSKl8TjouI-YPoQAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:38.855183 2026] [:error] [pid 9155:tid 140411557287680] [client 74.7.243.203:46348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltStbI7zhHXcabyMUzzgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:40.180854 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.243.203:52832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltTNCmCSWTlPouqorZkAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:41.435522 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.203:52846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltTdY0UrI5A3LftIzwUgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:43.864017 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.243.203:52862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltT7-sgTmmJoPuMdysCgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:45.713615 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.203:52866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltUb-sgTmmJoPuMdysCwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:48.191794 2026] [:error] [pid 2160:tid 140411624429312] [client 74.7.243.203:52876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltVDjrdei6i7MVRTDQ9wAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:49.511475 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.243.203:52888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltVb-sgTmmJoPuMdysDAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:51.842232 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.243.203:42280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltVxj0p0SRWAqcjGFuPQAAAxY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:53.368945 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.203:42286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltWRj0p0SRWAqcjGFuPwAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:54.686147 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:42294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltWqt8Nd0UC_OcbVG-EwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:55.772956 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.243.203:42310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltWweiSKl8TjouI-YPogAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:58.100326 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:42326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltXqt8Nd0UC_OcbVG-FgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:59.376048 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.243.203:42334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltX7-sgTmmJoPuMdysDQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:00.542866 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:51894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltYNCmCSWTlPouqorZlAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:01.939421 2026] [:error] [pid 9155:tid 140411540502272] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltYdbI7zhHXcabyMUz0AAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:07.744333 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:51914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltZ7-sgTmmJoPuMdysEgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:10.257403 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:51920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltatCmCSWTlPouqorZlgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:11.596800 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.243.203:57948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablta7-sgTmmJoPuMdysFAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:13.989653 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.203:57960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltbdY0UrI5A3LftIzwWQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:15.292748 2026] [:error] [pid 9155:tid 140411658000128] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltb9bI7zhHXcabyMUz0QAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:16.601942 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:57986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltcKBJNF7axNlVR0UKdQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:17.947898 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:57998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltcb-sgTmmJoPuMdysFgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:19.120908 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:58004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltcweiSKl8TjouI-YPpAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:24.126763 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.203:56484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablteNY0UrI5A3LftIzwXQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:25.471514 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.203:56492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltedY0UrI5A3LftIzwXgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:27.799690 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:56494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablteweiSKl8TjouI-YPpgAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:29.147306 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:56510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltfdCmCSWTlPouqorZlwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:35.683447 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:60804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltg64xEDsg_V3ESNZAfQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self
[Tue Mar 17 12:04:47.067457 2026] [:error] [pid 2160:tid 140411725141760] [client 74.7.241.46:58946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltjzjrdei6i7MVRTDRXQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:52.022925 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.241.46:45192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltlKt8Nd0UC_OcbVG-HAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:04.779895 2026] [:error] [pid 2160:tid 140411548894976] [client 74.7.241.46:45198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltoDjrdei6i7MVRTDRdAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:06.197095 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:51282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltogeiSKl8TjouI-YPrgAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:07.376523 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.46:51294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltoweiSKl8TjouI-YPrwAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:10.767996 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.243.203:60806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltpr-sgTmmJoPuMdysNQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:12.090626 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:43730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltqAeiSKl8TjouI-YPsAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:14.438956 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.203:43740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltqqt8Nd0UC_OcbVG-HgAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:20.518978 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.46:51804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltsBj0p0SRWAqcjGFuUgAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:31.769266 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltu64xEDsg_V3ESNZAiAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:33.354929 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:43744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltvQeiSKl8TjouI-YPzAAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:05:39.103581 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.243.203:36050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltw7-sgTmmJoPuMdysPAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:05:41.465287 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:44278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltxat8Nd0UC_OcbVG-NQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:05:42.623495 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:59236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltxqBJNF7axNlVR0UKhwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:46.171286 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.243.203:44290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltyhj0p0SRWAqcjGFuXQAAAxQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:48.547963 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:44292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltzNCmCSWTlPouqorZnAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:49.817373 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.203:44298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltzb-sgTmmJoPuMdysPwAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:58.364578 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt1qt8Nd0UC_OcbVG-QwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:59.667035 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:59686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt19CmCSWTlPouqorZnwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:00.875185 2026] [:error] [pid 9155:tid 140411741927168] [client 74.7.243.203:59480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt2NbI7zhHXcabyMUz4QAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:02.275090 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:59490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt2tbI7zhHXcabyMUz4gAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:05.701799 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.243.203:59500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt3b-sgTmmJoPuMdysRwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:13.591349 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.203:59502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt5at8Nd0UC_OcbVG-TQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:13.662131 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.46:36696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt5dY0UrI5A3LftIzwjwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:16.476376 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.46:60986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt6AeiSKl8TjouI-YP2QAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:18.122723 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:50688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt6qt8Nd0UC_OcbVG-VwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:20.511218 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.243.203:50692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt7K4xEDsg_V3ESNZAkQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:31.920835 2026] [:error] [pid 9155:tid 140411641214720] [client 74.7.243.203:34588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt99bI7zhHXcabyMU0FwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:32.929880 2026] [:error] [pid 9155:tid 140411557287680] [client 74.7.241.46:60990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt-NbI7zhHXcabyMU0GQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:33.261916 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:45382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt-dCmCSWTlPouqorZpwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:36.587755 2026] [:error] [pid 2160:tid 140411632822016] [client 74.7.241.46:54508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt_Djrdei6i7MVRTDRqwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:40.072045 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:54510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluANCmCSWTlPouqorZrAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:46.143890 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:53256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluBq4xEDsg_V3ESNZAmQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:47.803495 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:45392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluB6BJNF7axNlVR0UKmwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:50.269466 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:41262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluCgeiSKl8TjouI-YP5wAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:57.917669 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.46:53258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluEQeiSKl8TjouI-YP7wAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:58.295140 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.203:35414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluEr-sgTmmJoPuMdysXAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:59.202969 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:55446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluE9CmCSWTlPouqorZsQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:01.377425 2026] [:error] [pid 2160:tid 140411716749056] [client 74.7.241.46:55462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluFDjrdei6i7MVRTDRswAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:02.663283 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:35416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluFtCmCSWTlPouqorZtQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:03.086294 2026] [:error] [pid 2160:tid 140411708356352] [client 74.7.244.31:48292] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abluFzjrdei6i7MVRTDRtQAAAQQ"]
[Tue Mar 17 12:07:07.176197 2026] [:error] [pid 2160:tid 140411599251200] [client 74.7.243.203:46184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluGzjrdei6i7MVRTDRvAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:16.682526 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.243.203:46186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluJK4xEDsg_V3ESNZApAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:20.663140 2026] [:error] [pid 2160:tid 140411683178240] [client 74.7.241.46:55468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluKDjrdei6i7MVRTDRyAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:07:29.076859 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.243.203:34156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluMRj0p0SRWAqcjGFugwAAAxM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:07:32.907422 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:60370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluNAeiSKl8TjouI-YP-wAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:35.622855 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.46:60120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluN9Y0UrI5A3LftIzwmwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:37.122942 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.46:60126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluOK4xEDsg_V3ESNZApgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:40.776736 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.46:50306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluO7-sgTmmJoPuMdysZAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:42.089259 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.46:50318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluPhj0p0SRWAqcjGFujgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:48.901777 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.228.16:47560] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abluRKBJNF7axNlVR0UKtAAAAAM"]
[Tue Mar 17 12:07:55.191743 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:55568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluS6BJNF7axNlVR0UKvwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:56.480953 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:39694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluTK4xEDsg_V3ESNZAtwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:08:03.718251 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.203:39704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluU7-sgTmmJoPuMdysgAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:08:05.003645 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.46:50334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluVb-sgTmmJoPuMdysggAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:02.303425 2026] [:error] [pid 2160:tid 140411674785536] [client 74.7.241.46:46130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablujjjrdei6i7MVRTDSGAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:08.249064 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:51780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablulNCmCSWTlPouqorZ8QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:09.541830 2026] [:error] [pid 2160:tid 140411607643904] [client 74.7.241.46:55602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablulTjrdei6i7MVRTDSGQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:12.028732 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.46:55616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablumK4xEDsg_V3ESNZA4wAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:14.637033 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.46:55622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablumat8Nd0UC_OcbVG-xQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:15.982597 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:55634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablumweiSKl8TjouI-YQWgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:16.961922 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:52356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablunAeiSKl8TjouI-YQXAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:17.398741 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.46:55638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablunb-sgTmmJoPuMdysnAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:18.309934 2026] [:error] [pid 9155:tid 140411607643904] [client 74.7.243.203:54720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluntbI7zhHXcabyMU0oQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:19.480532 2026] [:error] [pid 9155:tid 140411632822016] [client 74.7.243.203:54728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablun9bI7zhHXcabyMU0pAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:20.820914 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.243.203:34786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluoL-sgTmmJoPuMdysnQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:22.939209 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.243.203:34800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluoqt8Nd0UC_OcbVG-zQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:33.296774 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:34804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablurdCmCSWTlPouqorZ_wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:35.699169 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:55434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablur64xEDsg_V3ESNZA7AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:50.801251 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:55450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluvdCmCSWTlPouqoraCgAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:50.804182 2026] [:error] [pid 9155:tid 140411741927168] [client 74.7.241.46:49290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluvtbI7zhHXcabyMU0wgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:52.193173 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.241.46:54330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluwK4xEDsg_V3ESNZA9wAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:53.322172 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluwa4xEDsg_V3ESNZA-QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:09:54.487561 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:54332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluwtCmCSWTlPouqoraDAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:57.882571 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.243.203:47752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluxb-sgTmmJoPuMdysqgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:10:06.366457 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:47762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluzq4xEDsg_V3ESNZBAgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:10:07.590096 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.241.46:54334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluz6t8Nd0UC_OcbVG_BwAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:16.193014 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.46:53298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu2L-sgTmmJoPuMdysugAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:17.584830 2026] [:error] [pid 2160:tid 140411632822016] [client 74.7.241.46:53312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu2Tjrdei6i7MVRTDSMgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:18.262216 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.243.203:44694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu2r-sgTmmJoPuMdysvAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:10:19.621364 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:49570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu29CmCSWTlPouqoraFAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:10:24.515617 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.46:41014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu4AeiSKl8TjouI-YQgAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:26.659886 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:53654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu4geiSKl8TjouI-YQggAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:27.975612 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:53660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu49CmCSWTlPouqoraFQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:44.728134 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu9KBJNF7axNlVR0ULKgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:47.476693 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.241.46:33786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu97-sgTmmJoPuMdyswgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:49.866569 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.46:54658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu-a4xEDsg_V3ESNZBDAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:58.771434 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.203:53676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvAhj0p0SRWAqcjGFvGQAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:11:18.122368 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:53764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvFtbI7zhHXcabyMU0_gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:11:23.720256 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.243.203:60168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvG6t8Nd0UC_OcbVG_MQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:11:52.395545 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvOKBJNF7axNlVR0ULbQAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:12:04.171878 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.241.46:48062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvRL-sgTmmJoPuMdys4QAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:12:06.714560 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.244.31:36168] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablvRhj0p0SRWAqcjGFvLQAAAwk"]
[Tue Mar 17 12:13:17.057055 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:47664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvja4xEDsg_V3ESNZBdgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:18.362872 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.241.46:59186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvjtbI7zhHXcabyMU1XQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:23.425314 2026] [:error] [pid 9155:tid 140411590858496] [client 74.7.241.46:59198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvk9bI7zhHXcabyMU1YQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:28.002007 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.46:59212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvmBj0p0SRWAqcjGFvXwAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:35.331581 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.46:58576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvn7-sgTmmJoPuMdytBQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:13:36.976983 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.46:58588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvoKt8Nd0UC_OcbVG_dQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:14:40.879528 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.241.46:50526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablv4Kt8Nd0UC_OcbVHAAQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:15:02.021276 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.46:60790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablv9hj0p0SRWAqcjGFvggAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:15:11.814857 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.46:39342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablv_64xEDsg_V3ESNZBlgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:15:38.972459 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:41644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablwGgeiSKl8TjouI-YRNQAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:17:06.472969 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:56028] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablwcaBJNF7axNlVR0UMHAAAABY"]
[Tue Mar 17 12:17:51.315315 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.46:33030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablwn6t8Nd0UC_OcbVHAegAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:17:54.144837 2026] [:error] [pid 9155:tid 140411658000128] [client 74.7.228.16:60792] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablwotbI7zhHXcabyMU1vwAAAko"]
[Tue Mar 17 12:19:54.170610 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.46:33788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxGtY0UrI5A3LftIzyGgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:04.059221 2026] [:error] [pid 9155:tid 140411666392832] [client 74.7.241.46:33792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxJNbI7zhHXcabyMU2SQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:07.266281 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.46:60564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxJ9Y0UrI5A3LftIzyIQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:20:08.607425 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.46:39520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxKBj0p0SRWAqcjGFwngAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:20:09.778690 2026] [:error] [pid 2160:tid 140411607643904] [client 74.7.241.46:39522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxKTjrdei6i7MVRTDS7AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:20:14.372337 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.46:39530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxLqt8Nd0UC_OcbVHAuAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:21.219713 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.46:39534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxNdY0UrI5A3LftIzyMAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:23.675186 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.241.46:46466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxN64xEDsg_V3ESNZCTgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:21:00.650604 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.241.46:46478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxXL-sgTmmJoPuMdyttgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:22:08.039243 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.244.31:46896] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablxoL-sgTmmJoPuMdytygAAAss"]
[Tue Mar 17 12:22:14.496008 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.241.46:43594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxpqt8Nd0UC_OcbVHBMgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:22:34.743038 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.46:44880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxutY0UrI5A3LftIzyfgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:22:54.711767 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.228.16:60362] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablxzqt8Nd0UC_OcbVHBRwAAAIs"]
[Tue Mar 17 12:23:45.243253 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:50278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyAa4xEDsg_V3ESNZCxQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:23:54.051115 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.46:52918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyCr-sgTmmJoPuMdyuKwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:23:55.527312 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.46:55642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyC64xEDsg_V3ESNZCyQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:24:13.731038 2026] [:error] [pid 2160:tid 140411641214720] [client 74.7.241.46:55646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyHTjrdei6i7MVRTDTVAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:24:22.643094 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:40778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyJtCmCSWTlPouqorcDAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:24:44.968093 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:54074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyPKBJNF7axNlVR0UNdQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:25:41.358639 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:42486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablydQeiSKl8TjouI-YSFgAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 12:26:20.808812 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:47466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablynNCmCSWTlPouqorcdgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:26:26.412194 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:56072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyotCmCSWTlPouqorcfQAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:26:32.515493 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.46:56074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyqNY0UrI5A3LftIzy8AAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:26:36.083984 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.46:35692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyrAeiSKl8TjouI-YSNgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:27:09.561449 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.244.31:49586] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablyzat8Nd0UC_OcbVHCIwAAAI0"]
[Tue Mar 17 12:27:11.435425 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:35696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyz9CmCSWTlPouqorcowAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:27:54.870559 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.228.16:34610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ably-qt8Nd0UC_OcbVHCYwAAAJU"]
[Tue Mar 17 12:28:13.355454 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:48648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzDaBJNF7axNlVR0UOBgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:28:13.636980 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.203:48338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzDdY0UrI5A3LftIzzPgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:25.756081 2026] [:error] [pid 2160:tid 140411641214720] [client 74.7.241.46:53490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzGTjrdei6i7MVRTDT9AAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:28:28.504218 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:49554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzHKt8Nd0UC_OcbVHCjwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:33.117063 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:53506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzIKBJNF7axNlVR0UODgAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:35.386910 2026] [:error] [pid 2160:tid 140411599251200] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzIzjrdei6i7MVRTDT-QAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:44.690708 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:54352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzLAeiSKl8TjouI-YScgAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:51.542965 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.203:46842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzM64xEDsg_V3ESNZDQAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:41.967563 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:46844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzZdCmCSWTlPouqorc2gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:44.355085 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:42884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzaAeiSKl8TjouI-YSegAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:56.320979 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.46:42290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdL-sgTmmJoPuMdyu7wAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:56.863372 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.241.46:42290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdL-sgTmmJoPuMdyu8AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:56.987037 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:42896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdKBJNF7axNlVR0UOIAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:57.514466 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:42896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdaBJNF7axNlVR0UOIQAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:59.354098 2026] [:error] [pid 2160:tid 140411708356352] [client 74.7.243.203:52606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdjjrdei6i7MVRTDUFgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:06.786582 2026] [:error] [pid 9155:tid 140411590858496] [client 74.7.243.203:60128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzftbI7zhHXcabyMU3RgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:07.290825 2026] [:error] [pid 9155:tid 140411699963648] [client 74.7.243.203:60128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzf9bI7zhHXcabyMU3RwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:16.027380 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.46:42290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablziL-sgTmmJoPuMdyu-gAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:26.325066 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:37172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzkq4xEDsg_V3ESNZDVQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:26.882723 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:37172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzkq4xEDsg_V3ESNZDVgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:27.963884 2026] [:error] [pid 9155:tid 140411574073088] [client 74.7.241.46:37640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzk9bI7zhHXcabyMU3UgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:30:32.231182 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.243.203:39984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmBj0p0SRWAqcjGFxyAAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:32.304652 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.46:50570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmBj0p0SRWAqcjGFxyQAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:30:33.503939 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmat8Nd0UC_OcbVHC_AAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:30:34.841799 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:50598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmqBJNF7axNlVR0UOJgAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:30:40.653482 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:39990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzoNCmCSWTlPouqorc6gAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:52.823587 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:39990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzrNCmCSWTlPouqorc7wAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:54.011120 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.46:40280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzrgeiSKl8TjouI-YSlAAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:30:58.698460 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:57354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzsq4xEDsg_V3ESNZDYAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:08.824223 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:57364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzvKt8Nd0UC_OcbVHDGwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:10.847668 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.46:40022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzvhj0p0SRWAqcjGFx2wAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:20.656555 2026] [:error] [pid 2160:tid 140411699963648] [client 74.7.243.203:43138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzyDjrdei6i7MVRTDUMAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:21.315208 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.46:36686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzydY0UrI5A3LftIzzZwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:31:26.973399 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.243.203:43140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzzqt8Nd0UC_OcbVHDJgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:36.398976 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:34728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz2L-sgTmmJoPuMdyvDQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:38.886637 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz2tY0UrI5A3LftIzzeAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:39.340147 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz29Y0UrI5A3LftIzzegAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:43.728728 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:49254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz37-sgTmmJoPuMdyvDwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:48.723520 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.203:49268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz5Kt8Nd0UC_OcbVHDNAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:59.687449 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.243.203:45438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz764xEDsg_V3ESNZDbwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:03.571694 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.243.203:40396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz8xj0p0SRWAqcjGFx5gAAAxU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:11.387251 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.243.203:40410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz-7-sgTmmJoPuMdyvGAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:13.987912 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:40410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz_b-sgTmmJoPuMdyvGgAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:14.335163 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.244.31:35298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablz_hj0p0SRWAqcjGFx5wAAAwQ"]
[Tue Mar 17 12:32:27.304839 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.46:51360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0C9CmCSWTlPouqordFgAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:32:28.624707 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.46:41844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0DL-sgTmmJoPuMdyvHAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:45.611170 2026] [:error] [pid 9155:tid 140411691570944] [client 74.7.241.46:41854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0HdbI7zhHXcabyMU3hAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:32:58.531070 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0KtbI7zhHXcabyMU3igAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:58.907330 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.228.16:49586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl0KtY0UrI5A3LftIzzjQAAAYA"]
[Tue Mar 17 12:33:07.341340 2026] [core:alert] [pid 11293:tid 140411733534464] [client 74.7.243.203:46544] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:22.250836 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:46560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0QqBJNF7axNlVR0UOUAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:41.567367 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.203:41508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0Vat8Nd0UC_OcbVHDbQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:42.893052 2026] [:error] [pid 2160:tid 140411624429312] [client 74.7.243.203:41418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0Vjjrdei6i7MVRTDUWQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:48.945178 2026] [:error] [pid 2160:tid 140411733534464] [client 74.7.243.203:41418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0XDjrdei6i7MVRTDUXwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:09.149887 2026] [:error] [pid 2160:tid 140411641214720] [client 74.7.243.203:41418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0cTjrdei6i7MVRTDUagAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:22.133604 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.243.203:49274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0fq4xEDsg_V3ESNZDrQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:26.556299 2026] [:error] [pid 2160:tid 140411548894976] [client 74.7.243.203:54618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0gjjrdei6i7MVRTDUbwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:35.031084 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.203:55184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0i9Y0UrI5A3LftIzzrQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:37.363949 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.243.203:55198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0jRj0p0SRWAqcjGFyCwAAAwU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:38.501895 2026] [proxy_fcgi:error] [pid 18380:tid 140411599251200] (70007)The timeout specified has expired: [client 45.227.253.15:46574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:34:44.883608 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.243.203:55202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0lL-sgTmmJoPuMdyvOwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:35:07.662945 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:56366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0q9Y0UrI5A3LftIzzvQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:35:17.137822 2026] [proxy_fcgi:error] [pid 7437:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:35:45.137814 2026] [proxy_fcgi:error] [pid 2160:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:36:27.133792 2026] [proxy_fcgi:error] [pid 17965:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:36:57.125806 2026] [proxy_fcgi:error] [pid 9155:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:37:22.137772 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:37:25.949608 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.244.31:59766] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl1NQeiSKl8TjouI-YS8gAAA8k"]
[Tue Mar 17 12:37:43.129786 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:38:19.047012 2026] [:error] [pid 9155:tid 140411616036608] [client 74.7.228.16:57748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl1a9bI7zhHXcabyMU4TgAAAk8"]
[Tue Mar 17 12:38:21.131280 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41338] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:38:49.129810 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:39:27.135139 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:39:54.069892 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:40:16.121816 2026] [proxy_fcgi:error] [pid 9155:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:40:37.121794 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:40:59.133928 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:41:21.129777 2026] [proxy_fcgi:error] [pid 17965:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:41:42.125791 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43668] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:42:04.143328 2026] [proxy_fcgi:error] [pid 9299:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:42:26.127924 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:42:47.129783 2026] [proxy_fcgi:error] [pid 9299:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:43:09.105794 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:43:31.389844 2026] [proxy_fcgi:error] [pid 9155:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:43:38.444142 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.228.16:42616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl2qtY0UrI5A3LftIz0UwAAAZE"]
[Tue Mar 17 12:43:53.125882 2026] [proxy_fcgi:error] [pid 2160:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:44:15.131640 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:44:36.134823 2026] [proxy_fcgi:error] [pid 18380:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:44:57.060041 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:45:19.110689 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:45:40.128687 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46690] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:46:01.113935 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:46:22.164742 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:46:44.093557 2026] [proxy_fcgi:error] [pid 9155:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:47:06.133798 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:47:27.122211 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:47:48.129798 2026] [proxy_fcgi:error] [pid 2160:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:48:10.309337 2026] [proxy_fcgi:error] [pid 7437:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48290] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:48:31.469904 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48530] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:48:53.045860 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:49:14.061839 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:49:32.899125 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.228.16:52708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl4DBj0p0SRWAqcjGFzJAAAAwU"]
[Tue Mar 17 12:49:36.115159 2026] [proxy_fcgi:error] [pid 18380:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:49:57.125908 2026] [proxy_fcgi:error] [pid 2160:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:50:07.045403 2026] [:error] [pid 2160:tid 140411699963648] [client 74.7.244.31:34122] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl4Ljjrdei6i7MVRTDVygAAAQU"]
[Tue Mar 17 12:50:19.037877 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:50:41.141813 2026] [proxy_fcgi:error] [pid 7437:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:51:02.134556 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:51:23.127972 2026] [proxy_fcgi:error] [pid 9155:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:51:44.126416 2026] [proxy_fcgi:error] [pid 9155:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:52:05.126418 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51840] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:52:27.144141 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:52:49.133769 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:53:10.149810 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:53:31.121851 2026] [proxy_fcgi:error] [pid 2160:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:53:53.135659 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:54:15.109987 2026] [proxy_fcgi:error] [pid 18380:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:54:36.136194 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:54:57.129924 2026] [proxy_fcgi:error] [pid 2160:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54366] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:55:06.168332 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.228.16:50340] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl5Wr-sgTmmJoPuMdyxHwAAAs4"]
[Tue Mar 17 12:55:18.070018 2026] [proxy_fcgi:error] [pid 17965:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:55:40.121759 2026] [proxy_fcgi:error] [pid 9155:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:56:04.073838 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:56:25.129830 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:56:46.129810 2026] [proxy_fcgi:error] [pid 17965:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:57:07.070037 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:57:08.612766 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.244.31:45714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl51Kt8Nd0UC_OcbVHFzAAAAJM"]
[Tue Mar 17 12:57:28.125824 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:57:49.106894 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:58:10.137823 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:58:32.121784 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:58:53.138008 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:59:14.130503 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:59:37.126064 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59290] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:59:58.157785 2026] [proxy_fcgi:error] [pid 2160:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:00:19.141799 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:00:30.700314 2026] [:error] [pid 9155:tid 140411632822016] [client 74.7.228.16:46106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl6ntbI7zhHXcabyMU6JwAAAk0"]
[Tue Mar 17 13:00:40.093815 2026] [proxy_fcgi:error] [pid 17965:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:01:01.121788 2026] [proxy_fcgi:error] [pid 2160:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:01:26.126632 2026] [proxy_fcgi:error] [pid 7437:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:01:48.069823 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:02:09.033826 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:02:14.343437 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.244.31:43776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl7BtCmCSWTlPouqorfNgAAAMk"]
[Tue Mar 17 13:02:30.129800 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:02:51.125235 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:03:12.137848 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:03:33.123055 2026] [proxy_fcgi:error] [pid 9155:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:03:55.129791 2026] [proxy_fcgi:error] [pid 17965:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36270] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:04:16.781798 2026] [proxy_fcgi:error] [pid 18380:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:04:38.129810 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:04:59.149787 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:05:20.121895 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:05:41.085866 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:06:02.132431 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:06:24.154067 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:06:49.123021 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:07:10.145817 2026] [proxy_fcgi:error] [pid 17965:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:07:31.053792 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:07:42.278694 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.244.31:46532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl8Tqt8Nd0UC_OcbVHG7QAAAIk"]
[Tue Mar 17 13:07:52.125818 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:08:13.365789 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:08:35.146019 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43366] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:08:56.129904 2026] [proxy_fcgi:error] [pid 18380:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43946] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:09:17.125802 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:09:40.145817 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44996] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:10:01.134271 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45488] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:10:23.037803 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:10:45.125812 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:11:06.149792 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:11:10.102656 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.228.16:53704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl9Hhj0p0SRWAqcjGF1gAAAAxE"]
[Tue Mar 17 13:11:28.137774 2026] [proxy_fcgi:error] [pid 2160:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:11:52.141798 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:12:13.125866 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:12:35.125804 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:12:49.762399 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.244.31:34826] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl9gat8Nd0UC_OcbVHHTwAAAIs"]
[Tue Mar 17 13:12:57.141838 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:13:18.129796 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:13:39.125879 2026] [proxy_fcgi:error] [pid 18380:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:14:00.185781 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52246] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:14:21.537809 2026] [proxy_fcgi:error] [pid 9155:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:14:43.137792 2026] [proxy_fcgi:error] [pid 2160:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:04.149813 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54064] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:25.324797 2026] [access_compat:error] [pid 19507:tid 140411599251200] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rip.php
[Tue Mar 17 13:15:28.522796 2026] [access_compat:error] [pid 19507:tid 140411741927168] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/about.php
[Tue Mar 17 13:15:30.125792 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:34.722262 2026] [access_compat:error] [pid 19507:tid 140411674785536] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ioxi-o.php
[Tue Mar 17 13:15:39.870412 2026] [access_compat:error] [pid 19507:tid 140411691570944] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/thickbox/index.php5
[Tue Mar 17 13:15:40.167729 2026] [access_compat:error] [pid 19507:tid 140411616036608] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 13:15:40.465392 2026] [access_compat:error] [pid 19507:tid 140411607643904] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Tue Mar 17 13:15:42.025129 2026] [access_compat:error] [pid 19507:tid 140411716749056] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/images/index.php5
[Tue Mar 17 13:15:44.959946 2026] [access_compat:error] [pid 19507:tid 140411649607424] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/index.php5
[Tue Mar 17 13:15:45.574351 2026] [access_compat:error] [pid 19507:tid 140411557287680] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/plupload/index.php5
[Tue Mar 17 13:15:47.499190 2026] [access_compat:error] [pid 19507:tid 140411733534464] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/222.php
[Tue Mar 17 13:15:47.798575 2026] [access_compat:error] [pid 19507:tid 140411666392832] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/abcd.php
[Tue Mar 17 13:15:48.095971 2026] [access_compat:error] [pid 19507:tid 140411683178240] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/class-t.api.php
[Tue Mar 17 13:15:48.393562 2026] [access_compat:error] [pid 19507:tid 140411674785536] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/classwithtostring.php
[Tue Mar 17 13:15:48.703329 2026] [access_compat:error] [pid 19507:tid 140411574073088] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Tue Mar 17 13:15:49.000881 2026] [access_compat:error] [pid 19507:tid 140411725141760] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Tue Mar 17 13:15:49.299637 2026] [access_compat:error] [pid 19507:tid 140411624429312] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/colors/coffee/index.php5
[Tue Mar 17 13:15:49.603994 2026] [access_compat:error] [pid 19507:tid 140411708356352] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/js/widgets/index.php5
[Tue Mar 17 13:15:49.902379 2026] [access_compat:error] [pid 19507:tid 140411632822016] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/languages/index.php5
[Tue Mar 17 13:15:50.202112 2026] [access_compat:error] [pid 19507:tid 140411691570944] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/languages/plugins/index.php5
[Tue Mar 17 13:15:50.502504 2026] [access_compat:error] [pid 19507:tid 140411699963648] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/themes/twentytwentyfour/index.php5
[Tue Mar 17 13:15:50.803389 2026] [access_compat:error] [pid 19507:tid 140411616036608] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/upgrade/index.php5
[Tue Mar 17 13:15:51.102725 2026] [access_compat:error] [pid 19507:tid 140411599251200] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/index.php5
[Tue Mar 17 13:15:51.133939 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:51.401166 2026] [access_compat:error] [pid 19507:tid 140411607643904] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-good.php
[Tue Mar 17 13:15:53.180667 2026] [access_compat:error] [pid 19507:tid 140411641214720] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/jquery/index.php5
[Tue Mar 17 13:15:53.479614 2026] [access_compat:error] [pid 19507:tid 140411658000128] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/jquery/ui/index.php5
[Tue Mar 17 13:15:53.778238 2026] [access_compat:error] [pid 19507:tid 140411716749056] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/tinymce/themes/index.php5
[Tue Mar 17 13:15:54.077155 2026] [access_compat:error] [pid 19507:tid 140411741927168] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/rest-api/index.php5
[Tue Mar 17 13:15:56.020509 2026] [access_compat:error] [pid 19507:tid 140411649607424] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/fonts/index.php5
[Tue Mar 17 13:15:58.011451 2026] [cgid:error] [pid 19507:tid 140411557287680] [client 20.53.243.118:26287] AH01265: attempt to invoke directory as script: /var/www/cgi-bin/
[Tue Mar 17 13:16:12.129796 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:16:33.134646 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:16:55.125787 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:17:16.129849 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:17:37.835358 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:17:59.149814 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:18:20.061869 2026] [proxy_fcgi:error] [pid 9155:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:18:41.125818 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60246] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:19:02.138256 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:19:23.133859 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:19:44.106898 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:20:05.129812 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:20:26.041839 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:20:48.030192 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:21:10.069832 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:21:31.085848 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:21:52.037904 2026] [proxy_fcgi:error] [pid 18380:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:22:14.073867 2026] [proxy_fcgi:error] [pid 17965:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:22:35.134964 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:22:56.101902 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:23:17.127426 2026] [proxy_fcgi:error] [pid 18380:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:23:38.132830 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:24:00.037819 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37476] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:24:21.062110 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:24:42.125263 2026] [proxy_fcgi:error] [pid 17965:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:25:03.133816 2026] [proxy_fcgi:error] [pid 9299:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:25:24.093795 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:25:45.121783 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:26:06.121932 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38244] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:26:27.129962 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:26:48.121809 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38530] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:27:09.129799 2026] [proxy_fcgi:error] [pid 7004:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:27:31.067709 2026] [proxy_fcgi:error] [pid 18380:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:27:52.137972 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:28:13.117869 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:28:34.117847 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:28:55.034966 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:29:17.041931 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:29:38.125817 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:30:01.125786 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:30:22.101857 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:30:45.120819 2026] [proxy_fcgi:error] [pid 17965:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:31:08.045883 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:31:29.110017 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:31:50.121796 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:32:11.125817 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:32:33.125827 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:32:55.121164 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:33:18.489802 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:33:40.117820 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:34:01.049828 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:34:24.121875 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:34:45.135366 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:35:06.129860 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:35:28.121843 2026] [proxy_fcgi:error] [pid 9299:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:35:49.134415 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:36:10.127879 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:36:31.137823 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:36:53.131839 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:37:14.120647 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:37:31.219282 2026] [access_compat:error] [pid 17965:tid 140411632822016] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/z.php
[Tue Mar 17 13:37:31.347584 2026] [access_compat:error] [pid 17965:tid 140411574073088] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lala.php
[Tue Mar 17 13:37:31.484733 2026] [access_compat:error] [pid 17965:tid 140411565680384] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/byp.php
[Tue Mar 17 13:37:31.632976 2026] [access_compat:error] [pid 17965:tid 140411716749056] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Tue Mar 17 13:37:31.762157 2026] [access_compat:error] [pid 17965:tid 140411641214720] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/8.php
[Tue Mar 17 13:37:36.129794 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:37:58.125848 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:38:20.125770 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:38:41.133450 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:39:02.139631 2026] [proxy_fcgi:error] [pid 18380:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:39:24.145840 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:39:45.125808 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:40:06.125791 2026] [proxy_fcgi:error] [pid 7004:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:40:27.117870 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:40:48.091474 2026] [proxy_fcgi:error] [pid 9299:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:41:09.130259 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:41:30.129842 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:41:51.120297 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:42:12.125862 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:42:33.129841 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:42:55.033830 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:43:16.129786 2026] [proxy_fcgi:error] [pid 7004:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52224] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:43:37.119897 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52668] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:43:58.125841 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:44:19.108108 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53442] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:44:40.121546 2026] [proxy_fcgi:error] [pid 9299:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:45:01.042196 2026] [proxy_fcgi:error] [pid 7437:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:45:23.129787 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:45:44.141801 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54352] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:46:05.133832 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:46:26.133828 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:46:47.089917 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:47:08.129125 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:47:29.082279 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:47:50.201791 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:48:12.072286 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:48:33.129833 2026] [proxy_fcgi:error] [pid 17965:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:48:54.121847 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:49:15.122038 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:49:36.129799 2026] [proxy_fcgi:error] [pid 18380:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:49:57.134051 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:50:18.093857 2026] [proxy_fcgi:error] [pid 17965:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:50:40.127567 2026] [proxy_fcgi:error] [pid 9299:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:51:01.035002 2026] [proxy_fcgi:error] [pid 18380:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:51:22.133786 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:51:43.121859 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:04.135244 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:25.109824 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:46.125785 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60400] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:59.312654 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.244.43:57604] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmG69CmCSWTlPouqorirAAAAMc"]
[Tue Mar 17 13:53:07.125808 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:53:08.503433 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.228.61:39458] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmG9AeiSKl8TjouI-YX_wAAA8A"]
[Tue Mar 17 13:53:29.133786 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:53:50.118358 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:54:11.049907 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:54:32.126053 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34030] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:54:36.917381 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.128:59396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmHTKBJNF7axNlVR0UVUQAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 13:54:53.049833 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34690] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:55:15.034007 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:55:36.122151 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:55:57.133203 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:56:13.175246 2026] [access_compat:error] [pid 9299:tid 140411716749056] [client 216.73.216.191:39038] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 13:56:18.069676 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:56:39.134372 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:00.121804 2026] [proxy_fcgi:error] [pid 17965:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:23.451958 2026] [proxy_fcgi:error] [pid 17965:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:45.125787 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:52.206505 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.244.43:52952] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmIEBj0p0SRWAqcjGF4yQAAAw0"]
[Tue Mar 17 13:57:57.348476 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.228.61:42868] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmIFXIk7brgkOH-rIWK4wAAAUw"]
[Tue Mar 17 13:58:06.119561 2026] [proxy_fcgi:error] [pid 7437:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:58:28.133776 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:58:50.129778 2026] [proxy_fcgi:error] [pid 7004:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:59:12.121982 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:59:37.145823 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:00.137816 2026] [proxy_fcgi:error] [pid 17965:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:07.987782 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.128:45798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIlweiSKl8TjouI-YY4gAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:13.339818 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.243.128:57698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmImcU6Sx0TG1YjmQitowAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:22.092575 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42332] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:30.312110 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.128:56048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIrr-sgTmmJoPuMdy11AAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:31.642230 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.128:56048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIr7-sgTmmJoPuMdy11QAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:36.263431 2026] [:error] [pid 28243:tid 140411708356352] [client 74.7.243.128:58182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmItA9EzQ9w6IvBX0sTPQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:44.130909 2026] [proxy_fcgi:error] [pid 7437:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42964] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:46.122235 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:42218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIvtY0UrI5A3LftIz7EAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:47.669616 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:42230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIv9Y0UrI5A3LftIz7EgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:50.643129 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:42232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIwqBJNF7axNlVR0UWVQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:52.124082 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.128:54114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIxNCmCSWTlPouqorjvAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:54.686069 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:54128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIxcU6Sx0TG1YjmQitygAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:57.018787 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.128:54132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIyL-sgTmmJoPuMdy14wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:59.195526 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.243.128:54148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIy8U6Sx0TG1YjmQit0gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:07.081838 2026] [proxy_fcgi:error] [pid 6296:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:01:09.059646 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.128:59272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI1at8Nd0UC_OcbVHKYwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:10.544903 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI1qt8Nd0UC_OcbVHKZQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:13.953781 2026] [core:alert] [pid 18380:tid 140411666392832] [client 74.7.241.31:51198] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/log
[Tue Mar 17 14:01:29.117877 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:01:33.995126 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI7at8Nd0UC_OcbVHKewAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:34.515441 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI7qt8Nd0UC_OcbVHKfgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:51.139675 2026] [proxy_fcgi:error] [pid 17965:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:14.125523 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:36.061851 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:38.963222 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:45184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJLvPqhzTj3BvfDX-HcAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Tue Mar 17 14:02:58.138763 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:59.446147 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.128:35554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJQ6BJNF7axNlVR0UWhwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:01.056641 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:50246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJRfPqhzTj3BvfDX-HggAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:01.067038 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.244.43:36600] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmJQxj0p0SRWAqcjGF5PgAAAw0"]
[Tue Mar 17 14:03:01.070805 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.228.61:44842] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmJRHIk7brgkOH-rIWLmQAAAUc"]
[Tue Mar 17 14:03:02.835261 2026] [:error] [pid 30223:tid 140411599251200] [client 74.7.243.128:50250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJRsT4LuLykoMK_89oGAAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:04.559461 2026] [:error] [pid 29359:tid 140411716749056] [client 74.7.243.128:50254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJSKSy22zYCMGxsIlcWAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:05.938481 2026] [:error] [pid 29826:tid 140411658000128] [client 74.7.243.128:50268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJSRltFzTUElcKTdKyvQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:08.609551 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:50272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJTPPqhzTj3BvfDX-HhAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:09.980530 2026] [:error] [pid 30223:tid 140411548894976] [client 74.7.243.128:35696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJTcT4LuLykoMK_89oHAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:11.931269 2026] [:error] [pid 28879:tid 140411607643904] [client 74.7.243.128:35702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJT1DN3UhJjLukrK-K1gAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:13.770848 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.243.128:35718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJUb-sgTmmJoPuMdy2MwAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:19.090000 2026] [:error] [pid 30223:tid 140411733534464] [client 74.7.243.128:35728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJV8T4LuLykoMK_89oIQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:20.146544 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:03:20.551676 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.128:40062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJWKBJNF7axNlVR0UWjAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:22.014945 2026] [:error] [pid 29359:tid 140411741927168] [client 74.7.243.128:40078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJWqSy22zYCMGxsIlcXwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:23.447113 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.128:40092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJW6BJNF7axNlVR0UWjQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:26.013164 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.128:40102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJXgeiSKl8TjouI-YZHAAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:42.117894 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:03:44.053535 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.128:40112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJcKt8Nd0UC_OcbVHKrwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:49.667744 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.243.128:55864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJdXIk7brgkOH-rIWLxgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:04:05.127970 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:04:07.006159 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:57310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJh9Y0UrI5A3LftIz7UwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:04:27.121796 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:04:43.002039 2026] [:error] [pid 29359:tid 140411674785536] [client 74.7.241.31:39874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJq6Sy22zYCMGxsIlcZAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:04:49.122876 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:04:50.519153 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:39886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJsvPqhzTj3BvfDX-HswAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:01.183500 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.243.128:47168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJvfPqhzTj3BvfDX-HvgAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:04.174453 2026] [:error] [pid 28879:tid 140411582465792] [client 74.7.243.128:47184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJwFDN3UhJjLukrK-LBAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:13.373778 2026] [proxy_fcgi:error] [pid 9299:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:05:19.841829 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.31:36428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJz9CmCSWTlPouqorkDgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:05:23.361182 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:45308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJ0weiSKl8TjouI-YZbgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:35.137973 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:05:57.169893 2026] [proxy_fcgi:error] [pid 28879:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52476] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:06:20.132238 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:06:42.121808 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:03.161777 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54814] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:25.128427 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:47.129793 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:51.780043 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:33036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKZ9Y0UrI5A3LftIz7sQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:07:54.258054 2026] [:error] [pid 28243:tid 140411683178240] [client 74.7.241.31:50292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKag9EzQ9w6IvBX0sUPgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:07:55.561868 2026] [:error] [pid 28243:tid 140411683178240] [client 74.7.241.31:50300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKaw9EzQ9w6IvBX0sUPwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:07:59.040459 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.241.31:50312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKb9CmCSWTlPouqorkoQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:08:09.125814 2026] [proxy_fcgi:error] [pid 29359:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:08:14.466666 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.228.61:59048] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmKffPqhzTj3BvfDX-IEgAAAdQ"]
[Tue Mar 17 14:08:14.466900 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.244.43:37176] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmKfRj0p0SRWAqcjGF5vAAAAwM"]
[Tue Mar 17 14:08:26.836058 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:48982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKivPqhzTj3BvfDX-IGwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:08:31.121864 2026] [proxy_fcgi:error] [pid 28243:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:08:32.608101 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.243.128:60026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKj7-sgTmmJoPuMdy2qAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 14:08:53.130219 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:08:56.154569 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:56780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKqAeiSKl8TjouI-YZzgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:08:59.202552 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:56780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKqweiSKl8TjouI-YZ0QAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:03.479005 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:43720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKrsU6Sx0TG1YjmQiuyAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:04.755366 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:43728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKsNY0UrI5A3LftIz7vAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:07.556124 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:43742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKs9Y0UrI5A3LftIz7vgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:09.215003 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:41832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKtXIk7brgkOH-rIWMJgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:16.393833 2026] [proxy_fcgi:error] [pid 29826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:09:18.568800 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:52380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKvr-sgTmmJoPuMdy2uQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:20.256343 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:52392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKwBj0p0SRWAqcjGF5ygAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:21.696507 2026] [:error] [pid 29826:tid 140411574073088] [client 74.7.241.31:52398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKwRltFzTUElcKTdKzRAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:25.840878 2026] [:error] [pid 28243:tid 140411658000128] [client 74.7.241.31:52412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKxQ9EzQ9w6IvBX0sUfQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:27.599228 2026] [:error] [pid 29359:tid 140411641214720] [client 74.7.241.31:50240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKx6Sy22zYCMGxsIlc3wAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:30.213082 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:50242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKyr-sgTmmJoPuMdy2vAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:38.821841 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:09:40.162310 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:55904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK1KBJNF7axNlVR0UXEAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:42.558785 2026] [:error] [pid 30223:tid 140411716749056] [client 74.7.241.31:55914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK1cT4LuLykoMK_89otAAAA4M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:47.994746 2026] [:error] [pid 28879:tid 140411699963648] [client 74.7.241.31:55928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK21DN3UhJjLukrK-LlgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:49.865507 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:43574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK3b-sgTmmJoPuMdy2vgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:51.300979 2026] [:error] [pid 30223:tid 140411725141760] [client 74.7.241.31:43588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK38T4LuLykoMK_89ouQAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:52.792254 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:43596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK4L-sgTmmJoPuMdy2wAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:57.492562 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:35920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK5cU6Sx0TG1YjmQiu7wAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:01.137783 2026] [proxy_fcgi:error] [pid 29826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:10:01.229458 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:35936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK6at8Nd0UC_OcbVHLTgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:04.611592 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:35938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK7Bj0p0SRWAqcjGF5zAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:06.060311 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:35940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK7tY0UrI5A3LftIz7yAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:09.189505 2026] [:error] [pid 29359:tid 140411699963648] [client 74.7.241.31:43994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK8aSy22zYCMGxsIlc5QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:11.041538 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:44000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK83Ik7brgkOH-rIWMLgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:12.672957 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:44002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK9Bj0p0SRWAqcjGF5zgAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:15.200603 2026] [:error] [pid 30223:tid 140411725141760] [client 74.7.241.31:44018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK98T4LuLykoMK_89ovgAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:23.152242 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:10:25.387266 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.241.31:39524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLARj0p0SRWAqcjGF53wAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:27.157938 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:39528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLA3Ik7brgkOH-rIWMLwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:28.642997 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:55860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLBMU6Sx0TG1YjmQiu9gAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:30.204878 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:55866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLBnIk7brgkOH-rIWMMAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:33.427078 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:55882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLCfPqhzTj3BvfDX-IKgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:36.795160 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:55882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLDPPqhzTj3BvfDX-IMAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:45.137781 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:10:46.422804 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLFhj0p0SRWAqcjGF6CQAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:46.979433 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLFhj0p0SRWAqcjGF6CgAAAxU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:47.739020 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:57780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLF7-sgTmmJoPuMdy2xAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:49.198171 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:57784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLGdY0UrI5A3LftIz7zwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:49.559515 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:57784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLGdY0UrI5A3LftIz70AAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:52.253007 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:57800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLHKBJNF7axNlVR0UXHQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:54.038728 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.31:57812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLHtCmCSWTlPouqorkuAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:57.019118 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.241.31:57820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLIat8Nd0UC_OcbVHLXQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:58.362415 2026] [:error] [pid 28879:tid 140411691570944] [client 74.7.241.31:50300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLIlDN3UhJjLukrK-LrgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:06.149796 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:11:08.727838 2026] [core:alert] [pid 28879:tid 140411557287680] [client 74.7.243.128:45478] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:09.511628 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:56268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLLdY0UrI5A3LftIz71AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:10.035110 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:56268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLLtY0UrI5A3LftIz71QAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:11.731947 2026] [:error] [pid 29359:tid 140411658000128] [client 74.7.241.31:56274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLL6Sy22zYCMGxsIlc7gAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:11.943688 2026] [:error] [pid 29359:tid 140411540502272] [client 74.7.241.31:56274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLL6Sy22zYCMGxsIlc7wAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:13.313783 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:56282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLMQeiSKl8TjouI-YZ7wAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:14.824703 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:56290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLMr-sgTmmJoPuMdy2xwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:16.343004 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:56302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLNKt8Nd0UC_OcbVHLYgAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:17.827138 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:47032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLNfPqhzTj3BvfDX-IQQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:19.253516 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.31:47040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLN64xEDsg_V3ESNZM2AAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:28.161777 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35408] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:11:29.722924 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:57874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLQXIk7brgkOH-rIWMOgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:31.606430 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:57878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLQ3Ik7brgkOH-rIWMOwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:33.253341 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:57884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLRaBJNF7axNlVR0UXIQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:36.157904 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.31:57892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLSNCmCSWTlPouqorkwwAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:38.500194 2026] [:error] [pid 29359:tid 140411708356352] [client 74.7.241.31:59346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLSqSy22zYCMGxsIlc8gAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:39.044773 2026] [:error] [pid 29359:tid 140411616036608] [client 74.7.241.31:59346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLS6Sy22zYCMGxsIlc8wAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:41.125456 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:59356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLTNY0UrI5A3LftIz72QAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:42.478769 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:59358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLTr-sgTmmJoPuMdy2yQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:44.223776 2026] [:error] [pid 29359:tid 140411607643904] [client 74.7.241.31:59372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLUKSy22zYCMGxsIlc9AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:45.945904 2026] [:error] [pid 29359:tid 140411641214720] [client 74.7.241.31:59376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLUaSy22zYCMGxsIlc9QAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:46.278931 2026] [:error] [pid 29359:tid 140411658000128] [client 74.7.241.31:59376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLUqSy22zYCMGxsIlc9gAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:47.687581 2026] [:error] [pid 30223:tid 140411725141760] [client 74.7.241.31:49170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLU8T4LuLykoMK_89o6gAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:49.610228 2026] [:error] [pid 30223:tid 140411548894976] [client 74.7.241.31:49174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLVcT4LuLykoMK_89o6wAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:51.131021 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:11:52.180220 2026] [:error] [pid 30223:tid 140411658000128] [client 74.7.241.31:49182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLWMT4LuLykoMK_89o7wAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:53.880480 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:49184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLWcU6Sx0TG1YjmQivAgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:57.919660 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:49194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLXaBJNF7axNlVR0UXKAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:05.689347 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:54596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLZaBJNF7axNlVR0UXTwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:13.131638 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:12:15.207769 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.31:48848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLb9CmCSWTlPouqorkxgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:19.277216 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:48862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLc8U6Sx0TG1YjmQivBwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:21.036311 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:34574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLdRj0p0SRWAqcjGF6HAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:22.490762 2026] [:error] [pid 29359:tid 140411691570944] [client 74.7.241.31:34590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLdqSy22zYCMGxsIlc-gAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:26.864148 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:34602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLetY0UrI5A3LftIz74QAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:28.524250 2026] [:error] [pid 28243:tid 140411658000128] [client 74.7.241.31:51736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLfA9EzQ9w6IvBX0sVCQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:35.042018 2026] [proxy_fcgi:error] [pid 7004:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:12:36.645866 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:51750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLhNY0UrI5A3LftIz78AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:37.942484 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:52814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLhat8Nd0UC_OcbVHLbgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:40.553385 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:52830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLiNY0UrI5A3LftIz78wAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:42.125132 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:52834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLitY0UrI5A3LftIz79AAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:44.936212 2026] [:error] [pid 28243:tid 140411641214720] [client 74.7.241.31:52846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLjA9EzQ9w6IvBX0sVGAAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:45.463491 2026] [:error] [pid 28243:tid 140411716749056] [client 74.7.241.31:52846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLjQ9EzQ9w6IvBX0sVGQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:47.986869 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:52848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLj9Y0UrI5A3LftIz79wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:58.329873 2026] [proxy_fcgi:error] [pid 28879:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38708] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:13:00.522213 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:38526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLnL-sgTmmJoPuMdy21AAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:13:03.279078 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:38530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLn64xEDsg_V3ESNZM5wAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:13:12.561637 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.244.43:45320] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmLp9CmCSWTlPouqork0AAAANc"]
[Tue Mar 17 14:13:12.843171 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.228.61:55526] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmLqNY0UrI5A3LftIz8CQAAAYI"]
[Tue Mar 17 14:13:24.393771 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:13:34.567491 2026] [:error] [pid 30223:tid 140411540502272] [client 74.7.241.31:38532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLvsT4LuLykoMK_89pEgAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:13:46.528558 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:13:48.547015 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:58898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLzKBJNF7axNlVR0UXWQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:14:08.070265 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:14:17.937155 2026] [:error] [pid 30223:tid 140411607643904] [client 74.7.241.31:58902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmL6cT4LuLykoMK_89pKQAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:14:30.141919 2026] [proxy_fcgi:error] [pid 9299:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:14:32.167908 2026] [:error] [pid 29359:tid 140411599251200] [client 74.7.241.31:58564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmL-KSy22zYCMGxsIldBwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:14:39.977706 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.31:58566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmL_9CmCSWTlPouqork4QAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:14:52.159485 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:15:14.135008 2026] [proxy_fcgi:error] [pid 29359:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:15:36.089924 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:15:38.706658 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.128:59374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMOaBJNF7axNlVR0UXhgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:15:41.607154 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.128:56874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMPat8Nd0UC_OcbVHLjgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:43.297685 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:56884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMP8U6Sx0TG1YjmQivUgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:44.826066 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.243.128:56900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMQMU6Sx0TG1YjmQivVgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:46.263342 2026] [:error] [pid 29359:tid 140411666392832] [client 74.7.243.128:56912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMQqSy22zYCMGxsIldIAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:47.709381 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:56924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMQweiSKl8TjouI-YabwAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:50.582969 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.243.128:35824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMRvPqhzTj3BvfDX-IewAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:52.130937 2026] [:error] [pid 30223:tid 140411666392832] [client 74.7.243.128:35838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMSMT4LuLykoMK_89pYQAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:58.133793 2026] [proxy_fcgi:error] [pid 7437:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:16:00.201095 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.128:58128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMUK4xEDsg_V3ESNZM-AAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:01.899847 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.128:58134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMUQeiSKl8TjouI-YacQAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:03.810067 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:58144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMU9Y0UrI5A3LftIz8ZQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:14.005024 2026] [:error] [pid 30223:tid 140411674785536] [client 74.7.243.128:58152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMXsT4LuLykoMK_89peQAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:19.125866 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:16:21.046010 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.128:53652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMZQeiSKl8TjouI-YadAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:22.509537 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.128:53664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMZqBJNF7axNlVR0UXjAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:23.934749 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:53672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMZ8U6Sx0TG1YjmQivaQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:24.313558 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.243.128:53672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMaMU6Sx0TG1YjmQivagAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:26.149207 2026] [:error] [pid 28879:tid 140411666392832] [client 74.7.243.128:53678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMalDN3UhJjLukrK-L4gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:26.390482 2026] [:error] [pid 28879:tid 140411599251200] [client 74.7.243.128:53678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMalDN3UhJjLukrK-L4wAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:27.767320 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.128:53680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMa6t8Nd0UC_OcbVHLlwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:29.318215 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.128:53688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMbat8Nd0UC_OcbVHLmgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:30.767145 2026] [:error] [pid 29359:tid 140411557287680] [client 74.7.243.128:56898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMbqSy22zYCMGxsIldKwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:32.130446 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:56906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMcHIk7brgkOH-rIWMaAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:33.696660 2026] [:error] [pid 28879:tid 140411708356352] [client 74.7.243.128:56916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMcVDN3UhJjLukrK-L5AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:35.239402 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.243.128:56926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMc3Ik7brgkOH-rIWMaQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:37.415549 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.243.128:56938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMdXIk7brgkOH-rIWMagAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:38.876013 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.128:56944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMdqt8Nd0UC_OcbVHLngAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:40.291344 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.243.128:36332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMePPqhzTj3BvfDX-IhgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:41.233830 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:16:41.774237 2026] [:error] [pid 17965:tid 140411590858496] [client 74.7.243.128:36338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMeat8Nd0UC_OcbVHLnwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:43.358952 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.243.128:36344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMexj0p0SRWAqcjGF6OgAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:45.055601 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:36344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMexj0p0SRWAqcjGF6OwAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:46.395244 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.128:36358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMfgeiSKl8TjouI-YaegAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:47.833167 2026] [:error] [pid 29359:tid 140411624429312] [client 74.7.243.128:36370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMf6Sy22zYCMGxsIldLwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:49.223266 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.128:36374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMgQeiSKl8TjouI-YafwAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:50.644322 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.243.128:43166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMgnIk7brgkOH-rIWMbAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:52.286965 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.128:43172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMhKt8Nd0UC_OcbVHLoAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:52.625021 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.128:43172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMhKt8Nd0UC_OcbVHLoQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:53.883964 2026] [:error] [pid 30223:tid 140411540502272] [client 74.7.243.128:43184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMhcT4LuLykoMK_89pgQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:55.339011 2026] [:error] [pid 30223:tid 140411557287680] [client 74.7.243.128:43190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMh8T4LuLykoMK_89pgwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:56.973130 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.243.128:43204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMiKSy22zYCMGxsIldMAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:58.436882 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:43206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMiqBJNF7axNlVR0UXlwAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:03.933801 2026] [proxy_fcgi:error] [pid 18380:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:17:05.037299 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.243.128:52920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMkRj0p0SRWAqcjGF6PgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:06.481528 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.128:52932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMkqBJNF7axNlVR0UXpQAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:08.110592 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:52944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMlNY0UrI5A3LftIz8dwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:09.575530 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:37452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMldY0UrI5A3LftIz8ewAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:10.971532 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.243.128:37466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMlvPqhzTj3BvfDX-IjwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:12.481905 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:37474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMmBj0p0SRWAqcjGF6QgAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:14.051578 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.128:37480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMmtCmCSWTlPouqork-AAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:15.583074 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.128:37488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMm6t8Nd0UC_OcbVHLpgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:16.999036 2026] [:error] [pid 29359:tid 140411540502272] [client 74.7.243.128:37496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMnKSy22zYCMGxsIldNAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:18.435899 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.243.128:37498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMnvPqhzTj3BvfDX-ImQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:19.851674 2026] [:error] [pid 30223:tid 140411649607424] [client 74.7.243.128:44112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMn8T4LuLykoMK_89piAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:25.977651 2026] [:error] [pid 29359:tid 140411557287680] [client 74.7.243.128:44124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMpaSy22zYCMGxsIldNwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:27.129914 2026] [proxy_fcgi:error] [pid 30223:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:17:30.314809 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.128:44130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMqr-sgTmmJoPuMdy3CgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:17:32.008650 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.128:35294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMrBj0p0SRWAqcjGF6SwAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:17:49.125816 2026] [proxy_fcgi:error] [pid 28243:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:18:10.373834 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47012] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:18:12.767081 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.228.61:58816] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmM1Kt8Nd0UC_OcbVHLtQAAAIc"]
[Tue Mar 17 14:18:13.415181 2026] [:error] [pid 29359:tid 140411607643904] [client 74.7.244.43:41360] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmM1aSy22zYCMGxsIldPwAAAlA"]
[Tue Mar 17 14:18:33.127103 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:18:41.269707 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:44522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmM8aBJNF7axNlVR0UX6QAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:18:55.128434 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:19:17.101842 2026] [proxy_fcgi:error] [pid 30223:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:19:40.085815 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:19:44.635662 2026] [mime_magic:error] [pid 19507:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:59174] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/spool/postfix
[Tue Mar 17 14:20:03.070138 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:20:07.877795 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:49774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNRtY0UrI5A3LftIz9AAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:20:29.121894 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:20:36.287935 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:34540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNZHIk7brgkOH-rIWMtwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:20:51.129825 2026] [proxy_fcgi:error] [pid 30223:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:20:56.715736 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:34428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNePPqhzTj3BvfDX-I6wAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:21:13.121936 2026] [proxy_fcgi:error] [pid 18380:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:21:35.133894 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52556] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:21:57.138988 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:21:58.607443 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.241.31:40732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNtqSy22zYCMGxsIldywAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:22:04.915487 2026] [:error] [pid 29359:tid 140411590858496] [client 74.7.243.128:44638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNvKSy22zYCMGxsIld0AAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:06.617245 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.128:42590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNvqBJNF7axNlVR0UYZQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:08.678835 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.243.128:42592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNwMU6Sx0TG1YjmQiv2AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:09.999854 2026] [:error] [pid 28879:tid 140411557287680] [client 74.7.243.128:46846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNwVDN3UhJjLukrK-MIgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:11.650984 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.243.128:46856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNw3Ik7brgkOH-rIWMygAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:19.141097 2026] [proxy_fcgi:error] [pid 28879:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:22:22.004108 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:43306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNzsU6Sx0TG1YjmQiv3wAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:24.518606 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.128:43312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNz6BJNF7axNlVR0UYawAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:27.089884 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:43314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN0xj0p0SRWAqcjGF6lQAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:28.724327 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:43326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN1NY0UrI5A3LftIz9HQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:30.181055 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:42200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN1nIk7brgkOH-rIWMzQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:30.580466 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.241.31:56012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN1q4xEDsg_V3ESNZNcQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:31.570617 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.243.128:42208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN18U6Sx0TG1YjmQiv4gAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:33.041199 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:42216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN2dY0UrI5A3LftIz9IAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:41.058851 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54450] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:22:42.948399 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:58678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN4geiSKl8TjouI-YawQAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:43.671953 2026] [:error] [pid 29359:tid 140411733534464] [client 74.7.243.128:44336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN46Sy22zYCMGxsIld1wAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:44.644937 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.31:34164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN5KBJNF7axNlVR0UYbQAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:47.071316 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.241.31:34166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN5qt8Nd0UC_OcbVHL9AAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:47.072333 2026] [:error] [pid 29359:tid 140411616036608] [client 74.7.243.128:44336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN5qSy22zYCMGxsIld2gAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:48.383721 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:36012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN6PPqhzTj3BvfDX-JBgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:49.126279 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:44352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN6cU6Sx0TG1YjmQiv5AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:49.959355 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:36020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN6fPqhzTj3BvfDX-JCAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:52.450498 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.128:47964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN7K4xEDsg_V3ESNZNeAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:53.752202 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.243.128:47968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN7fPqhzTj3BvfDX-JCgAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:55.201556 2026] [:error] [pid 28879:tid 140411708356352] [client 74.7.243.128:47972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN71DN3UhJjLukrK-MLgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:08.141803 2026] [proxy_fcgi:error] [pid 9299:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:23:09.234922 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:36022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN_at8Nd0UC_OcbVHL-gAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:10.967874 2026] [:error] [pid 29359:tid 140411590858496] [client 74.7.241.31:47822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN_qSy22zYCMGxsIld3wAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:11.359804 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.128:39246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN_weiSKl8TjouI-YayAAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:12.359927 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:47826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOAHIk7brgkOH-rIWM0QAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:13.130527 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.243.128:39256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOARj0p0SRWAqcjGF6nAAAAxQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:13.835277 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:47838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOAdY0UrI5A3LftIz9KgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:14.257618 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.228.61:48350] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmOAhj0p0SRWAqcjGF6nQAAAwc"]
[Tue Mar 17 14:23:15.295293 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:47850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOA6BJNF7axNlVR0UYcQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:15.865043 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.243.128:39260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOA_PqhzTj3BvfDX-JEAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:16.332571 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.244.43:43670] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmOBHIk7brgkOH-rIWM0gAAAUc"]
[Tue Mar 17 14:23:16.906307 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:47852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOBHIk7brgkOH-rIWM0wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:18.231120 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:56312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOBr-sgTmmJoPuMdy3YwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:19.675699 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:56320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOB64xEDsg_V3ESNZNewAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:21.068908 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.241.31:56326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOCaSy22zYCMGxsIld6QAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:22.523248 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:56340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOCqt8Nd0UC_OcbVHL-wAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:22.999679 2026] [:error] [pid 29359:tid 140411649607424] [client 74.7.243.128:39270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOCqSy22zYCMGxsIld6wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:23.886844 2026] [:error] [pid 29359:tid 140411599251200] [client 74.7.241.31:56342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOC6Sy22zYCMGxsIld7AAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:25.308589 2026] [:error] [pid 29359:tid 140411741927168] [client 74.7.241.31:56348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmODaSy22zYCMGxsIld7wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:25.770756 2026] [:error] [pid 29359:tid 140411607643904] [client 74.7.243.128:37766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmODaSy22zYCMGxsIld8AAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:27.537539 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.128:37770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOD64xEDsg_V3ESNZNfAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:27.984755 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.241.31:56360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOD6t8Nd0UC_OcbVHL_gAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:28.978093 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.243.128:37784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOEKt8Nd0UC_OcbVHL_wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:29.666405 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.241.31:53586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOEa4xEDsg_V3ESNZNfgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:30.057867 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:23:31.029580 2026] [:error] [pid 28879:tid 140411565680384] [client 74.7.241.31:53600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOE1DN3UhJjLukrK-MOgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:32.566833 2026] [core:alert] [pid 18380:tid 140411649607424] [client 74.7.241.31:53602] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:33.100824 2026] [:error] [pid 28879:tid 140411616036608] [client 74.7.243.128:55714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFVDN3UhJjLukrK-MPwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:33.139171 2026] [:error] [pid 29359:tid 140411624429312] [client 74.7.241.31:53604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFaSy22zYCMGxsIld8wAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:34.400769 2026] [:error] [pid 29359:tid 140411616036608] [client 74.7.243.128:55718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFqSy22zYCMGxsIld9QAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:36.386582 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.241.31:53610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFqSy22zYCMGxsIld9gAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:36.389852 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.128:55730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOF6t8Nd0UC_OcbVHMAwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:37.705110 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.241.31:51086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOGat8Nd0UC_OcbVHMCAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:52.127106 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:23:54.472720 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOKa4xEDsg_V3ESNZNhAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:54.473560 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.128:55736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOKat8Nd0UC_OcbVHMEwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:54.695557 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOKq4xEDsg_V3ESNZNhQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:56.569460 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:51204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOLBj0p0SRWAqcjGF6ogAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:57.047399 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.243.128:34150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOLXIk7brgkOH-rIWM3AAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:58.008411 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:56950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOLq4xEDsg_V3ESNZNiAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:59.432352 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:56960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOL3Ik7brgkOH-rIWM4AAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:59.957903 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.243.128:34164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOL3Ik7brgkOH-rIWM4QAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:02.394488 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.243.128:37640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOMXIk7brgkOH-rIWM4gAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:02.398492 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.241.31:56964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOML-sgTmmJoPuMdy3cQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:14.121787 2026] [proxy_fcgi:error] [pid 28879:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:24:15.398057 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:56092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOP9Y0UrI5A3LftIz9OwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:16.871257 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.243.128:56104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQK4xEDsg_V3ESNZNjQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:17.337610 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:44008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQQeiSKl8TjouI-Ya1gAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:19.252132 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.243.128:56118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQnIk7brgkOH-rIWM6wAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:19.254357 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.241.31:41504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQ6t8Nd0UC_OcbVHMHAAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:20.659341 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.243.128:55124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORL-sgTmmJoPuMdy3eAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:21.416607 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:41506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORa4xEDsg_V3ESNZNjgAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:22.159227 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.243.128:55134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORr-sgTmmJoPuMdy3eQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:22.907976 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:41520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORq4xEDsg_V3ESNZNkQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:39.129817 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:24:40.513467 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.128:42014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWAeiSKl8TjouI-Ya3QAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:41.257225 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:35066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWXIk7brgkOH-rIWM9QAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:42.003609 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.243.128:42030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWsU6Sx0TG1YjmQiv_wAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:42.171540 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:35066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWnIk7brgkOH-rIWM9wAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:43.496137 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.128:42032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWweiSKl8TjouI-Ya4AAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:44.371748 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:35074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOXAeiSKl8TjouI-Ya4gAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:57.455270 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:43724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOafPqhzTj3BvfDX-JNQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:58.899906 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:43726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOanIk7brgkOH-rIWNAwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:59.379073 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.128:42036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOa6BJNF7axNlVR0UYlwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:00.323289 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:43740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmObBj0p0SRWAqcjGF6zwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:01.143115 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:25:01.983682 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.31:43748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmObat8Nd0UC_OcbVHMKQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:03.239667 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOb6t8Nd0UC_OcbVHMKwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:03.697064 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOb6t8Nd0UC_OcbVHMLAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:04.454933 2026] [:error] [pid 28879:tid 140411632822016] [client 74.7.241.31:43756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOcFDN3UhJjLukrK-MYgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:05.187369 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.243.128:51824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOccU6Sx0TG1YjmQiwAAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:05.914375 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:43766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOcaBJNF7axNlVR0UYmAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:06.627828 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.243.128:51830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOcr-sgTmmJoPuMdy3iwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:07.356883 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:33956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOc7-sgTmmJoPuMdy3jAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:08.083564 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.243.128:51834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdHIk7brgkOH-rIWNDQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:08.873662 2026] [:error] [pid 28879:tid 140411649607424] [client 74.7.241.31:33960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdFDN3UhJjLukrK-MZAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:09.603395 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:35638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdcU6Sx0TG1YjmQiwAgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:10.308741 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:33962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdtY0UrI5A3LftIz9SwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:23.041958 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:25:24.332331 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.243.128:47814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhHIk7brgkOH-rIWNFAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:25.071269 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:52162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOha4xEDsg_V3ESNZNsgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:26.478222 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:52168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhgeiSKl8TjouI-Ya7wAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:26.930013 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.243.128:47826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhq4xEDsg_V3ESNZNtAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:27.958159 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:58088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhxj0p0SRWAqcjGF61QAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:28.633089 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.243.128:47832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOiBj0p0SRWAqcjGF61gAAAwQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:29.366948 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:58096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOiaBJNF7axNlVR0UYoAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:45.129789 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:25:46.491494 2026] [:error] [pid 28879:tid 140411658000128] [client 74.7.243.128:49478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOmlDN3UhJjLukrK-McQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:47.204349 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:54106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOm_PqhzTj3BvfDX-JRQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:48.669183 2026] [:error] [pid 28879:tid 140411699963648] [client 74.7.241.31:44004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOnFDN3UhJjLukrK-McgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:50.160608 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:44016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOnnIk7brgkOH-rIWNHAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:07.094440 2026] [proxy_fcgi:error] [pid 29359:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:26:09.220094 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:50436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOsPPqhzTj3BvfDX-JTQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:11.367849 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:50450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOs9Y0UrI5A3LftIz9XgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:12.811041 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.31:50460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOtKt8Nd0UC_OcbVHMQQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:28.125790 2026] [proxy_fcgi:error] [pid 28879:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:26:29.355037 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:45918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOxa4xEDsg_V3ESNZNxQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:30.818597 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:45924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOxvPqhzTj3BvfDX-JVwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:34.200454 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:45934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOysU6Sx0TG1YjmQiwJAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:37.431136 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:46228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOzfPqhzTj3BvfDX-JWgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:38.887468 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:46234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOzsU6Sx0TG1YjmQiwJQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:40.324115 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:46240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO0NY0UrI5A3LftIz9bAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:41.676841 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:46244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO0QeiSKl8TjouI-Ya_AAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:42.951512 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:46254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO0tY0UrI5A3LftIz9bwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:44.395005 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:46270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO1NY0UrI5A3LftIz9dQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:45.897182 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:46284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO1at8Nd0UC_OcbVHMSAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:47.342062 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO17-sgTmmJoPuMdy3rAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:48.123592 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO2L-sgTmmJoPuMdy3rwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:50.007938 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:57950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO2r-sgTmmJoPuMdy3sQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:50.045877 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:26:51.442552 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:57952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO264xEDsg_V3ESNZN0QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:53.150825 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:57960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO3fPqhzTj3BvfDX-JXwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:54.617819 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:57970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO3tY0UrI5A3LftIz9eQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:56.015416 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:57976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO4Bj0p0SRWAqcjGF68gAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:57.497936 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:34586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO4XIk7brgkOH-rIWNNgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:11.129768 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:27:13.239812 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:55154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO8QeiSKl8TjouI-YbCQAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:14.643818 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:55170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO8geiSKl8TjouI-YbDAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:16.079363 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:55172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO9Kt8Nd0UC_OcbVHMWQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:17.606812 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:39160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO9a4xEDsg_V3ESNZN5gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:33.133797 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:27:38.387585 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:39172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPChj0p0SRWAqcjGF7AgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:54.131643 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:28:04.463663 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:46936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPJNY0UrI5A3LftIz9kAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:12.915229 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:39116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPLKBJNF7axNlVR0UZCAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:14.415921 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:39126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPLq4xEDsg_V3ESNZN_AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:14.487501 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.228.61:41228] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmPLqt8Nd0UC_OcbVHMaAAAAJQ"]
[Tue Mar 17 14:28:15.779316 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:39130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPL9Y0UrI5A3LftIz9kwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:16.141804 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:28:16.798025 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.244.43:37514] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmPML-sgTmmJoPuMdy32QAAAtM"]
[Tue Mar 17 14:28:17.419271 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:50622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPMQeiSKl8TjouI-YbKAAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:19.046235 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:50628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPM3Ik7brgkOH-rIWNWgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:20.388313 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:50642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPNK4xEDsg_V3ESNZN_wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:21.899054 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:50656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPNRj0p0SRWAqcjGF7EAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:23.447472 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:50666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPN6t8Nd0UC_OcbVHMbQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:26.519411 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.241.31:50680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPOr-sgTmmJoPuMdy34AAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:28.546309 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:54568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPPL-sgTmmJoPuMdy35QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:32.596992 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:54572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPQHIk7brgkOH-rIWNXgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:38.125876 2026] [proxy_fcgi:error] [pid 17965:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35488] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:28:40.202364 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.241.31:53046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPSK4xEDsg_V3ESNZOBwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:42.727538 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:53048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPSr-sgTmmJoPuMdy37QAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:44.333665 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:53052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPTPPqhzTj3BvfDX-JhwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:45.770149 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:53058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPTdY0UrI5A3LftIz9ngAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:47.191019 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:53060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPT_PqhzTj3BvfDX-JiQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:48.674887 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:46792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPUKt8Nd0UC_OcbVHMcQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:50.182505 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:46802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPUgeiSKl8TjouI-YbMQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:51.586438 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:46808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPU_PqhzTj3BvfDX-JjAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:53.066038 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPVRj0p0SRWAqcjGF7HAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:00.134895 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:29:01.427239 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:49704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPXdY0UrI5A3LftIz9pgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:03.164029 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:49708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPXxj0p0SRWAqcjGF7HwAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:04.670885 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:49720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPYPPqhzTj3BvfDX-JkgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:06.110167 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:49728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPYtY0UrI5A3LftIz9qAAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:07.554685 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:50762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPY64xEDsg_V3ESNZODQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:08.992746 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:50776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPZNY0UrI5A3LftIz9qgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:10.374183 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.241.31:50780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPZr-sgTmmJoPuMdy3-AAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:11.806359 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:50784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPZ7-sgTmmJoPuMdy3-QAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:12.022815 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:50784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPaL-sgTmmJoPuMdy3-wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:12.552376 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:50784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPaL-sgTmmJoPuMdy3_gAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:14.303116 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:50794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPaq4xEDsg_V3ESNZOEQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:15.832176 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:50810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPa8U6Sx0TG1YjmQiwcQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:22.129778 2026] [proxy_fcgi:error] [pid 28879:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:29:23.544242 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:37226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPc9Y0UrI5A3LftIz9rAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:24.933911 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:37242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPdMU6Sx0TG1YjmQiwcgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:26.350740 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.31:37246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPdq4xEDsg_V3ESNZOFgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:27.855911 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:59112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPdxj0p0SRWAqcjGF7JwAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:29.321055 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:59118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPefPqhzTj3BvfDX-JmgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:30.802034 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.241.31:59132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPeqt8Nd0UC_OcbVHMgAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:32.295960 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:59136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPfK4xEDsg_V3ESNZOGAAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:33.758565 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:59138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPfdY0UrI5A3LftIz9sQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:35.230145 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:59152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPfweiSKl8TjouI-YbPwAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:36.727867 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:59168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPgPPqhzTj3BvfDX-JnwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:38.142279 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:34748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPgqt8Nd0UC_OcbVHMgwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:44.126750 2026] [proxy_fcgi:error] [pid 28879:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:29:46.145397 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:34756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPir-sgTmmJoPuMdy4CgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:47.559411 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.31:36486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPi7-sgTmmJoPuMdy4DAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:48.988220 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:36500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPjAeiSKl8TjouI-YbQwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:50.462791 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.241.31:36508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPjq4xEDsg_V3ESNZOHwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:51.875381 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.241.31:36522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPj64xEDsg_V3ESNZOIQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:53.447854 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.241.31:36524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPkat8Nd0UC_OcbVHMhQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:54.859207 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:36536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPkq4xEDsg_V3ESNZOJQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:56.247194 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:36538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPlKBJNF7axNlVR0UZVQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:57.606995 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:40180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPlb-sgTmmJoPuMdy4FQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:58.891760 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:40182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPlvPqhzTj3BvfDX-JpQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:00.229517 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPmPPqhzTj3BvfDX-JqAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:05.146769 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:40194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPm9Y0UrI5A3LftIz9vAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:06.121843 2026] [proxy_fcgi:error] [pid 6296:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:30:06.451264 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:40196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPngeiSKl8TjouI-YbUAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:08.031389 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:57560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPoKBJNF7axNlVR0UZXQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:09.403443 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:57564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPoQeiSKl8TjouI-YbWQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:10.973933 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.31:57572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPor-sgTmmJoPuMdy4GQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:12.284173 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:57576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPpAeiSKl8TjouI-YbXQAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:13.568486 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:57586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPpfPqhzTj3BvfDX-JtwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:14.928763 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:57602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPpq4xEDsg_V3ESNZOKgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:17.968776 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.241.31:57606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPqb-sgTmmJoPuMdy4HwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:19.554833 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.241.31:47198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPq7-sgTmmJoPuMdy4IwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:20.870145 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:47204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPrPPqhzTj3BvfDX-JvQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:22.146966 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:47218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPrhj0p0SRWAqcjGF7OgAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:23.471089 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:47224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPr9Y0UrI5A3LftIz9wgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:24.955759 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:47226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPsPPqhzTj3BvfDX-JwwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:26.403061 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:47232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPstY0UrI5A3LftIz9yAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:28.128047 2026] [proxy_fcgi:error] [pid 17965:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:30:29.035225 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:53860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPtQeiSKl8TjouI-YbagAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:31.472531 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:53868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPt6t8Nd0UC_OcbVHMlgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:30:32.747906 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.241.31:53884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPuL-sgTmmJoPuMdy4JwAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:48.591424 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:53894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPyK4xEDsg_V3ESNZOSwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:50.061874 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:30:50.256695 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:59122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPynIk7brgkOH-rIWNiAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:51.578667 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:59138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPyweiSKl8TjouI-YbegAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:52.879298 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:59152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPzKBJNF7axNlVR0UZcQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:54.165090 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:59164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPzqBJNF7axNlVR0UZcwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:04.513284 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:59180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP2Bj0p0SRWAqcjGF7TwAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:05.811002 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:49984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP2Rj0p0SRWAqcjGF7UgAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:07.214334 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:49994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP26BJNF7axNlVR0UZdwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:08.711084 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:52886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP3Bj0p0SRWAqcjGF7VAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:10.155992 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.241.31:52900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP3r-sgTmmJoPuMdy4OAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:11.691398 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:52910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP3weiSKl8TjouI-YbfwAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:12.123407 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:31:13.112031 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:52912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP4aBJNF7axNlVR0UZeAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:14.410322 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:52924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP4qBJNF7axNlVR0UZegAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:15.704014 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:52938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP48U6Sx0TG1YjmQiwuwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:17.816434 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:52948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP5at8Nd0UC_OcbVHMoQAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:19.117797 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:55546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP59Y0UrI5A3LftIz93AAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:20.452128 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:55560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP6Bj0p0SRWAqcjGF7VwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:21.741243 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:55570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP6cU6Sx0TG1YjmQiwxgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:23.084136 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:55584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP6xj0p0SRWAqcjGF7WQAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:24.418390 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:55598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP7AeiSKl8TjouI-YbhgAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:25.727142 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:55610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP7QeiSKl8TjouI-YbiAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:27.074232 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:55612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP7xj0p0SRWAqcjGF7XAAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:28.462925 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.241.31:41674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP8L-sgTmmJoPuMdy4OQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:29.899266 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.241.31:41688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP8a4xEDsg_V3ESNZOVQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:31.392454 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:41690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP86BJNF7axNlVR0UZfwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:32.843399 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:41698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP9L-sgTmmJoPuMdy4OgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:34.129474 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:31:34.215108 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:41702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP9geiSKl8TjouI-YbiQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:35.546505 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:41710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP98U6Sx0TG1YjmQiw1QAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:36.827459 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:41720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP-K4xEDsg_V3ESNZOVgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:38.107039 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.31:51272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP-qBJNF7axNlVR0UZgAAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:39.491083 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:51286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP-7-sgTmmJoPuMdy4PQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:40.802231 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:51296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP_MU6Sx0TG1YjmQiw3gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:42.092286 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:51312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP_hj0p0SRWAqcjGF7XgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:43.427723 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.241.31:51322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP_64xEDsg_V3ESNZOWAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:44.783280 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:51332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQANY0UrI5A3LftIz94wAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:46.063214 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:51344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQAsU6Sx0TG1YjmQiw5QAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:47.323756 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:47662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQA6BJNF7axNlVR0UZgQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:48.619468 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:47676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQBNY0UrI5A3LftIz95QAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:49.906294 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.241.31:47680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQBb-sgTmmJoPuMdy4PwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:51.237793 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:47688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQB7-sgTmmJoPuMdy4QAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:52.581620 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:47704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQCMU6Sx0TG1YjmQiw7AAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:53.899260 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:47710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQCcU6Sx0TG1YjmQiw7wAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:56.092925 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:47718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQC9Y0UrI5A3LftIz95wAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:56.133767 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:31:57.428297 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:54560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQDdY0UrI5A3LftIz96AAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:58.726697 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.241.31:54576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQDr-sgTmmJoPuMdy4RgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:59.994966 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:54580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQD8U6Sx0TG1YjmQiw9QAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:01.319482 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:54588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQEb-sgTmmJoPuMdy4SwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:02.709272 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:54590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQEtY0UrI5A3LftIz96gAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:16.947698 2026] [:error] [pid 7004:tid 140411733534464] [client 74.7.243.128:58458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQIMU6Sx0TG1YjmQixAwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:17.814639 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:54592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQIRj0p0SRWAqcjGF7bwAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:32:18.133827 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:32:26.770840 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:40466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQKq4xEDsg_V3ESNZOZwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:28.132152 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:49696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQLKBJNF7axNlVR0UZhwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:32.451952 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:49706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQMAeiSKl8TjouI-YbkgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:35.322399 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:49708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQM9Y0UrI5A3LftIz98wAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:36.917314 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.31:49718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQNKBJNF7axNlVR0UZiQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:40.129826 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39750] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:32:41.422096 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:56196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQOQeiSKl8TjouI-YblAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:42.756138 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:56210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQOqt8Nd0UC_OcbVHMzwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:44.006227 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:56220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQPBj0p0SRWAqcjGF7dQAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:45.311794 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:56234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQPb-sgTmmJoPuMdy4UgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:46.606780 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:56248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQPvPqhzTj3BvfDX-J8QAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:47.904299 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.31:36070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQP6BJNF7axNlVR0UZjgAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:50.185153 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:36082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQQqt8Nd0UC_OcbVHM2AAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:51.482320 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:36088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQQxj0p0SRWAqcjGF7eAAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:53.259442 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:36092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQRXIk7brgkOH-rIWNpAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:57.287361 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:36094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQSdY0UrI5A3LftIz9-QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:00.091935 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.241.31:58130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQTL-sgTmmJoPuMdy4WAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:01.737602 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:58138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQTcU6Sx0TG1YjmQixCwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:03.347316 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:58144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQT8U6Sx0TG1YjmQixDgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:03.349647 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:33:05.667540 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:58150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQUaBJNF7axNlVR0UZlAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:06.933456 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:58164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQUvPqhzTj3BvfDX-KAAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:08.273045 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:33102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQVKBJNF7axNlVR0UZmwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:09.579169 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:33118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQVcU6Sx0TG1YjmQixEQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:10.849174 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:33130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQVtY0UrI5A3LftIz9_gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:12.156107 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:33146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQWMU6Sx0TG1YjmQixEwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:13.455853 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.241.31:33162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQWb-sgTmmJoPuMdy4WQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:14.907609 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:33168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQWvPqhzTj3BvfDX-KBQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:17.409032 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:33184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQXQeiSKl8TjouI-YbnQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:17.674030 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.244.43:57890] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmQXXIk7brgkOH-rIWNqAAAAUE"]
[Tue Mar 17 14:33:18.177151 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.228.61:44926] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmQXr-sgTmmJoPuMdy4WgAAAtQ"]
[Tue Mar 17 14:33:23.709319 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:36652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQY64xEDsg_V3ESNZOcAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:27.853420 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:36666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQZ7-sgTmmJoPuMdy4YAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:29.189296 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:44960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQaRj0p0SRWAqcjGF7gAAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:31.113843 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:33:31.642387 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:44974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQa6BJNF7axNlVR0UZnQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:33.082178 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:44986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQbcU6Sx0TG1YjmQixFgAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:35.643417 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.241.31:45002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQbxj0p0SRWAqcjGF7hAAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:45.583112 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:45010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQedY0UrI5A3LftIz-CwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:48.471077 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:40414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQe6BJNF7axNlVR0UZowAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:53.130136 2026] [proxy_fcgi:error] [pid 9299:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41082] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:34:15.130083 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:34:37.057893 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:34:47.621374 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:45892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQt9Y0UrI5A3LftIz-PgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:50.464358 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:56624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQugeiSKl8TjouI-YbuQAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:53.316149 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:56628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQvcU6Sx0TG1YjmQixNAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:54.939827 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:56638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQvgeiSKl8TjouI-YbugAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:59.129784 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:35:01.179083 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:56644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQxcU6Sx0TG1YjmQixRQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:03.977507 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:34054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQxweiSKl8TjouI-YbvAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:08.003377 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:34056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQzPPqhzTj3BvfDX-KIwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:09.616080 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:60702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQza4xEDsg_V3ESNZOjQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:11.079893 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.241.31:60704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQz7-sgTmmJoPuMdy4jAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:13.138976 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:60708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ0QeiSKl8TjouI-YbvQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:20.076881 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:49374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ2K4xEDsg_V3ESNZOjgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:22.033811 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:35:24.542979 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:49380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ3MU6Sx0TG1YjmQixTwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:31.626265 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:49386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ4xj0p0SRWAqcjGF7wAAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:34.491205 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:60294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ5sU6Sx0TG1YjmQixVQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:36.143583 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.31:60306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ6KBJNF7axNlVR0UaAAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:43.363795 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:43278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ7xj0p0SRWAqcjGF7ywAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:44.121828 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:35:47.314360 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:43282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ8weiSKl8TjouI-YbxwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:51.547419 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:59330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ97-sgTmmJoPuMdy4mQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:54.384838 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:59334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ-nIk7brgkOH-rIWN3QAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:58.726160 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:59342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ_geiSKl8TjouI-YbzgAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:00.395856 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:56672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRAPPqhzTj3BvfDX-KLQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:05.125797 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:36:06.196416 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:56688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRBqt8Nd0UC_OcbVHNUgAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:36:19.291565 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.241.31:49156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmREq4xEDsg_V3ESNZOrAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:22.163577 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:41578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRFvPqhzTj3BvfDX-KOAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:25.045583 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:41580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRGXIk7brgkOH-rIWN7AAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:36:26.125781 2026] [proxy_fcgi:error] [pid 17965:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:36:30.827627 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.241.31:41588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRHqt8Nd0UC_OcbVHNXQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:47.129821 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:37:00.231540 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:38664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRPK4xEDsg_V3ESNZOxwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:37:03.429642 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:48228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRP6BJNF7axNlVR0UaSQAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:05.620478 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.128:38266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRQaBJNF7axNlVR0UaSwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:08.075161 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44932] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:37:20.563048 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:48232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRUPPqhzTj3BvfDX-KTwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:37:29.125817 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:37:35.546423 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:38072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRXweiSKl8TjouI-YcAQAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:42.723600 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:45670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRZgeiSKl8TjouI-YcBgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:51.113830 2026] [proxy_fcgi:error] [pid 29151:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:00.476612 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:37620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmReBj0p0SRWAqcjGF8AAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:38:12.126421 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:15.631881 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.128:49742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRh7-sgTmmJoPuMdy43AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:19.891346 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.228.61:35466] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmRi3Ik7brgkOH-rIWODgAAAUw"]
[Tue Mar 17 14:38:20.656118 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.244.43:54470] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmRjHIk7brgkOH-rIWODwAAAVA"]
[Tue Mar 17 14:38:28.747595 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.128:51232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRlAeiSKl8TjouI-YcEwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:33.100383 2026] [proxy_fcgi:error] [pid 9299:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:36.439019 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:46660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRnNY0UrI5A3LftIz-pwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:38:38.097634 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:36904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRnsU6Sx0TG1YjmQixgQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:43.573993 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:36918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRo9Y0UrI5A3LftIz-rwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:48.058906 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:36924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRqPPqhzTj3BvfDX-KYgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:38:49.474752 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:35788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRqa4xEDsg_V3ESNZO4QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:38:54.089785 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:54.196904 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:35796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRrgeiSKl8TjouI-YcGQAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:01.431505 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:35798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRtdY0UrI5A3LftIz-tQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:39:04.637922 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.241.31:48510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRuKt8Nd0UC_OcbVHNfQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:13.067093 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:48518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRwcU6Sx0TG1YjmQixowAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:39:15.120410 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:39:21.799178 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.243.128:48116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRyRj0p0SRWAqcjGF8LwAAAwQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:39:36.129897 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:39:37.621214 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.241.31:34602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR2b-sgTmmJoPuMdy49wAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:39.346150 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:36252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR2_PqhzTj3BvfDX-KdAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:47.845231 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:36268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR4_PqhzTj3BvfDX-KiQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:58.093819 2026] [proxy_fcgi:error] [pid 9299:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:40:01.245891 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:50858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR8Rj0p0SRWAqcjGF8SAAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:40:09.544422 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.243.128:60746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR-a4xEDsg_V3ESNZPFgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:40:14.067780 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:60168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR_geiSKl8TjouI-YcNAAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:40:18.962211 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.243.128:59048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSAr-sgTmmJoPuMdy5BgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:40:20.123799 2026] [proxy_fcgi:error] [pid 17965:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:40:42.130987 2026] [proxy_fcgi:error] [pid 7437:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:04.161767 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:20.301477 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.128:41028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSQK4xEDsg_V3ESNZPTQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:41:26.130630 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:47.126131 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50556] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:54.287631 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:43582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSYtY0UrI5A3LftIz_FgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:42:08.104294 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:42:29.065822 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51250] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:42:32.911494 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:42750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSiPPqhzTj3BvfDX-K1gAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:42:41.537509 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.243.128:51138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSka4xEDsg_V3ESNZPagAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:42:50.130149 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:06.811829 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.243.128:34266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSqr-sgTmmJoPuMdy5XQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:43:07.199669 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:58546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSq6t8Nd0UC_OcbVHN5AAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:43:11.538553 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.128:45900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSrq4xEDsg_V3ESNZPdQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:43:12.137788 2026] [proxy_fcgi:error] [pid 6296:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:13.154360 2026] [:error] [pid 17965:tid 140411699963648] [client 74.7.241.31:39690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSsat8Nd0UC_OcbVHN6wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:43:15.031910 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:39706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSs_PqhzTj3BvfDX-K5gAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:43:33.041879 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:54.137826 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:59.682772 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.243.128:60116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmS364xEDsg_V3ESNZPlgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:44:15.573938 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:44:37.089938 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:44:42.375148 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.128:45664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTCgeiSKl8TjouI-YclQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:44:58.119469 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:45:19.153789 2026] [proxy_fcgi:error] [pid 9299:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:45:41.093913 2026] [proxy_fcgi:error] [pid 7004:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:46:04.129791 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:46:05.190928 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:45664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTXQeiSKl8TjouI-YcvAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:46:06.331150 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:39710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTXqBJNF7axNlVR0UbegAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:46:11.507241 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:47068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTYxj0p0SRWAqcjGF85gAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:46:25.129890 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:46:47.249816 2026] [proxy_fcgi:error] [pid 17965:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:09.138038 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:10.247686 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:58358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTnnIk7brgkOH-rIWO1AAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:11.961764 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:58012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTn9Y0UrI5A3LftIz_owAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:13.467547 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:58028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTocU6Sx0TG1YjmQiyYwAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:14.854384 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:58038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTohj0p0SRWAqcjGF9EAAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:15.153773 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:58038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmToxj0p0SRWAqcjGF9EQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:16.435279 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:58040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTpNY0UrI5A3LftIz_qAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:17.892544 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:53312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTpQeiSKl8TjouI-Yc2QAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:30.129842 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57514] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:31.463639 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:47594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTs_PqhzTj3BvfDX-LfAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:32.972944 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:47600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTtPPqhzTj3BvfDX-LfQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:34.375713 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:47606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTtnIk7brgkOH-rIWO4wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:35.823007 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:47618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTtweiSKl8TjouI-Yc7QAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:36.166478 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:47618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTuAeiSKl8TjouI-Yc7wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:37.735341 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:58414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTudY0UrI5A3LftIz_swAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:39.106652 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:58422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTu_PqhzTj3BvfDX-LgAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:51.069844 2026] [proxy_fcgi:error] [pid 9299:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:52.439889 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:49140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTyAeiSKl8TjouI-Yc9AAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:54.763173 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:49156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTygeiSKl8TjouI-Yc-QAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:55.278668 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:43326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTyxj0p0SRWAqcjGF9LwAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:47:56.285219 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:49170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTzKt8Nd0UC_OcbVHOgwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:57.773945 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:59232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTzaBJNF7axNlVR0UbswAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:59.247055 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:59238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTz9Y0UrI5A3LftIz_ugAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:00.727063 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:59242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT0NY0UrI5A3LftIz_vQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:02.409169 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:59244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT0tY0UrI5A3LftIz_wAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:12.125802 2026] [proxy_fcgi:error] [pid 9299:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:48:13.477883 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:33240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT3fPqhzTj3BvfDX-LkgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:15.184157 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:33256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT3sU6Sx0TG1YjmQiyfgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:17.171854 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:33264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT4at8Nd0UC_OcbVHOjwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:18.454939 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.31:45778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT4qBJNF7axNlVR0UbuQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:19.816844 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:45792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT46t8Nd0UC_OcbVHOkgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:21.140476 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:45800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT5cU6Sx0TG1YjmQiygQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:25.031259 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:45816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT6at8Nd0UC_OcbVHOmwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:26.780767 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:45830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT6qBJNF7axNlVR0UbwAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:28.330120 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:35770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT7Bj0p0SRWAqcjGF9SQAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:29.791276 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:35774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT7at8Nd0UC_OcbVHOnQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:31.288398 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.241.31:35780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT77-sgTmmJoPuMdy54wAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:32.704053 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:35788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8HIk7brgkOH-rIWPBQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:34.121816 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:48:34.151404 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8r-sgTmmJoPuMdy55gAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:34.351544 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8r-sgTmmJoPuMdy55wAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:35.642481 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:35814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8_PqhzTj3BvfDX-LnQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:37.093864 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:35826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT9aBJNF7axNlVR0UbyAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:38.626123 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:59822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT9sU6Sx0TG1YjmQiyigAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:40.075701 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:59826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT-NY0UrI5A3LftIz_3QAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:41.559251 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:59842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT-Rj0p0SRWAqcjGF9UwAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:43.053486 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:59846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT-8U6Sx0TG1YjmQiyiwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:44.004623 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.128:43896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT_K4xEDsg_V3ESNZQLQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:44.862976 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:59856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT_AeiSKl8TjouI-YdFAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:56.133843 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:48:57.338939 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:60322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUCRj0p0SRWAqcjGF9WwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:58.839274 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:60324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUCsU6Sx0TG1YjmQiykgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:00.173706 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:60328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUDKBJNF7axNlVR0Ub0AAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:01.645848 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:60338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUDb-sgTmmJoPuMdy58QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:01.799431 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:60338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUDb-sgTmmJoPuMdy58gAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:03.358794 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.31:60342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUD6BJNF7axNlVR0Ub1QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:04.740139 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:60358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUENY0UrI5A3LftIz_7QAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:06.220837 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:60374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUEq4xEDsg_V3ESNZQNQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:21.132613 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:49:22.393931 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUItY0UrI5A3LftIz_9AAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:23.843126 2026] [:error] [pid 7004:tid 140411733534464] [client 74.7.241.31:52360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUI8U6Sx0TG1YjmQiymwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:25.391341 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:52376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUJb-sgTmmJoPuMdy6AgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:25.894434 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:53958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUJdY0UrI5A3LftIz_-AAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:49:28.071205 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:52386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUKPPqhzTj3BvfDX-LtAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:29.733038 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:58412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUKa4xEDsg_V3ESNZQPgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:43.058644 2026] [proxy_fcgi:error] [pid 17965:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:49:44.919149 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:59718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUOBj0p0SRWAqcjGF9awAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:46.163522 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:59728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUOqBJNF7axNlVR0Ub8AAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:47.596882 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.31:59398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUO6BJNF7axNlVR0Ub9AAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:49.434629 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:59400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUPHIk7brgkOH-rIWPPAAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:51.492176 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:59412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUP8U6Sx0TG1YjmQiyowAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:58.371039 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:59480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmURtY0UrI5A3LftIwACgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:59.782317 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:59492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUR6t8Nd0UC_OcbVHO0gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:01.307333 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:59508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUSa4xEDsg_V3ESNZQRgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:04.338724 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.241.31:59510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUS7-sgTmmJoPuMdy6FAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:05.122250 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:50:06.908228 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.241.31:59510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUTb-sgTmmJoPuMdy6GAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:10.904007 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:44344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUUvPqhzTj3BvfDX-LxQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:50:27.123280 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:50:29.160318 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:44358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUZRj0p0SRWAqcjGF9fgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:50:33.942924 2026] [mime_magic:error] [pid 6296:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:35144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/lib
[Tue Mar 17 14:50:49.133788 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:11.141793 2026] [proxy_fcgi:error] [pid 18380:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:33.142216 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:39.819347 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:40616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUq9Y0UrI5A3LftIwAYAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:51:47.321313 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.128:45570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUs64xEDsg_V3ESNZQdQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:51:50.287489 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.243.128:49374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUtsU6Sx0TG1YjmQiy3gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:51:55.157796 2026] [proxy_fcgi:error] [pid 29151:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:58.797198 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:58756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUvvPqhzTj3BvfDX-L_QAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:51:59.315715 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.243.128:49374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUv8U6Sx0TG1YjmQiy5QAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:52:17.133789 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:52:39.120922 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:53:01.141842 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:53:22.992824 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.244.43:58098] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmVEQeiSKl8TjouI-YdjgAAA9M"]
[Tue Mar 17 14:53:23.145816 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:53:26.266715 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.228.61:35072] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmVFat8Nd0UC_OcbVHPGQAAAJM"]
[Tue Mar 17 14:53:44.065861 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:54:06.128267 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:54:28.425782 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:54:50.121924 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:55:04.647444 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:36832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVeHIk7brgkOH-rIWP9AAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:55:09.155763 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:60066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVfcU6Sx0TG1YjmQizawAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:55:10.950939 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:49488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVfr-sgTmmJoPuMdy6nAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:55:12.085945 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:55:15.343767 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:49492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVgweiSKl8TjouI-Yd5gAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:55:34.151954 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:55:56.113834 2026] [proxy_fcgi:error] [pid 9299:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:56:06.111736 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:51685] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVtnIk7brgkOH-rIWQLAAAAUk"]
[Tue Mar 17 14:56:18.185966 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:56:19.916935 2026] [:error] [pid 7004:tid 140411616036608] [client 216.73.216.191:29460] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVw8U6Sx0TG1YjmQizjQAAAo8"]
[Tue Mar 17 14:56:28.168416 2026] [:error] [pid 9299:tid 140411632822016] [client 216.73.216.191:64806] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVzL-sgTmmJoPuMdy63QAAAs0"]
[Tue Mar 17 14:56:30.612723 2026] [:error] [pid 19507:tid 140411624429312] [client 216.73.216.191:9203] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVztY0UrI5A3LftIwA7AAAAY4"]
[Tue Mar 17 14:56:40.137835 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:56:46.898189 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:49494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmV3nIk7brgkOH-rIWQSQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:56:52.173883 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.243.128:33860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmV5L-sgTmmJoPuMdy67AAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:56:53.191182 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:51184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmV5dY0UrI5A3LftIwBCwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:57:01.125870 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:57:20.823085 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.128:46064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWAKBJNF7axNlVR0UdAgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:57:23.129796 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:57:43.055817 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:51198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWF6BJNF7axNlVR0UdGwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:57:45.098025 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:58:00.502187 2026] [mime_magic:error] [pid 7004:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:50700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/dovecot
[Tue Mar 17 14:58:00.502328 2026] [access_compat:error] [pid 7004:tid 140411683178240] [client 74.7.243.128:50700] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/dovecot
[Tue Mar 17 14:58:07.128619 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:58:11.418911 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:7537] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWM3Ik7brgkOH-rIWQigAAAUk"]
[Tue Mar 17 14:58:21.087654 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.244.43:53216] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmWPcU6Sx0TG1YjmQiz2gAAAoA"]
[Tue Mar 17 14:58:27.903100 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.228.61:49430] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmWQ64xEDsg_V3ESNZRGwAAAgo"]
[Tue Mar 17 14:58:29.045810 2026] [proxy_fcgi:error] [pid 7004:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45274] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:58:38.015947 2026] [:error] [pid 18380:tid 140411582465792] [client 216.73.216.191:56112] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWTq4xEDsg_V3ESNZRIgAAAhM"]
[Tue Mar 17 14:58:51.117801 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:59:13.125791 2026] [proxy_fcgi:error] [pid 7004:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:59:14.274455 2026] [:error] [pid 2473:tid 140411632822016] [client 216.73.216.191:35266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWcqBJNF7axNlVR0UdUgAAAA0"]
[Tue Mar 17 14:59:15.667412 2026] [core:alert] [pid 6296:tid 140411649607424] [client 74.7.241.31:44110] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc
[Tue Mar 17 14:59:17.411312 2026] [:error] [pid 7437:tid 140411699963648] [client 216.73.216.191:19923] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWdQeiSKl8TjouI-YeewAAA8U"]
[Tue Mar 17 14:59:25.813467 2026] [:error] [pid 9299:tid 140411557287680] [client 216.73.216.191:52219] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWfb-sgTmmJoPuMdy7VwAAAtY"]
[Tue Mar 17 14:59:27.193624 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:34844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWf6BJNF7axNlVR0UdZAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:59:34.389394 2026] [:error] [pid 9299:tid 140411548894976] [client 216.73.216.191:52219] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWhr-sgTmmJoPuMdy7YAAAAtc"]
[Tue Mar 17 14:59:35.133916 2026] [proxy_fcgi:error] [pid 9299:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:59:42.090733 2026] [:error] [pid 7437:tid 140411599251200] [client 216.73.216.191:42448] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWjgeiSKl8TjouI-YehAAAA9E"]
[Tue Mar 17 14:59:55.292647 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:45318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWm7-sgTmmJoPuMdy7dQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:59:56.104272 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:00:18.121818 2026] [proxy_fcgi:error] [pid 18380:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:00:23.870228 2026] [:error] [pid 7437:tid 140411691570944] [client 216.73.216.191:46464] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWtgeiSKl8TjouI-YepwAAA8Y"]
[Tue Mar 17 15:00:25.689123 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.241.31:37108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWuat8Nd0UC_OcbVHQBwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:00:34.467711 2026] [:error] [pid 7437:tid 140411641214720] [client 216.73.216.191:51129] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWwgeiSKl8TjouI-YerwAAA8w"]
[Tue Mar 17 15:00:39.167825 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.241.31:37108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWx6t8Nd0UC_OcbVHQDAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:00:40.137806 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:00:43.773937 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:37666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWyhj0p0SRWAqcjGF-uwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:00:44.779243 2026] [:error] [pid 6296:tid 140411548894976] [client 216.73.216.191:27577] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWzHIk7brgkOH-rIWQ8wAAAVc"]
[Tue Mar 17 15:00:49.118883 2026] [:error] [pid 2473:tid 140411674785536] [client 216.73.216.191:33281] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmW0aBJNF7axNlVR0UdhgAAAAg"]
[Tue Mar 17 15:00:56.638418 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:48202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmW2NY0UrI5A3LftIwB2gAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:02.211311 2026] [:error] [pid 2473:tid 140411582465792] [client 216.73.216.191:50651] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmW3qBJNF7axNlVR0UdigAAABM"]
[Tue Mar 17 15:01:08.141871 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:01:33.805803 2026] [proxy_fcgi:error] [pid 7437:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:01:40.635467 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:37672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXBNY0UrI5A3LftIwB9gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:41.587259 2026] [:error] [pid 2598:tid 140411632822016] [client 216.73.216.191:43878] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXBRj0p0SRWAqcjGF-2wAAAw0"]
[Tue Mar 17 15:01:44.885048 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:42564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXCPPqhzTj3BvfDX-NSAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:46.493252 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:42578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXChj0p0SRWAqcjGF-3gAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:47.817350 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:48504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXC9Y0UrI5A3LftIwB_AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:49.275198 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:48520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXDQeiSKl8TjouI-Ye1AAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:49.739317 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:48520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXDQeiSKl8TjouI-Ye1gAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:51.900783 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:48530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXD6BJNF7axNlVR0UdqgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:54.023854 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:48546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXEhj0p0SRWAqcjGF-4wAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:57.125860 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:01:58.255363 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:48550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXFhj0p0SRWAqcjGF-6AAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:02.067449 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:54818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXGQeiSKl8TjouI-Ye6QAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:07.907163 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:54820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXHhj0p0SRWAqcjGF-6wAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:09.362782 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:50164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXIXIk7brgkOH-rIWRGQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:13.878626 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:50178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXJdY0UrI5A3LftIwCDgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:14.085382 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:50178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXJtY0UrI5A3LftIwCEAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:17.790920 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:55812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXKa4xEDsg_V3ESNZRhAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:20.133805 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:02:23.166013 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:55828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXL6BJNF7axNlVR0UdvAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:26.163696 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:55842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXMvPqhzTj3BvfDX-NZQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:30.097850 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:36216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXNXIk7brgkOH-rIWRKQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:32.227368 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:36218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXONY0UrI5A3LftIwCGQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:34.279212 2026] [mime_magic:error] [pid 29151:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:42494] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Tue Mar 17 15:02:35.300736 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:36230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXO7-sgTmmJoPuMdy70AAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:37.441064 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:55960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXPQeiSKl8TjouI-YfAAAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:40.395461 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:55974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXQNY0UrI5A3LftIwCHAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:43.129806 2026] [proxy_fcgi:error] [pid 9299:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:02:44.427143 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:55980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXRAeiSKl8TjouI-YfBAAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:45.987124 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:55982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXRdY0UrI5A3LftIwCHgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:48.427569 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:52440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXSBj0p0SRWAqcjGF_AgAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:49.565009 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:52440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXSRj0p0SRWAqcjGF_AwAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:51.414997 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:52456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXS6BJNF7axNlVR0UdyQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:54.048128 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXTtY0UrI5A3LftIwCIAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:57.061204 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:52474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXUat8Nd0UC_OcbVHQTQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:57.601793 2026] [mime_magic:error] [pid 2473:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:57042] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:02:57.602172 2026] [access_compat:error] [pid 2473:tid 140411641214720] [client 216.73.216.191:57042] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 15:03:00.014695 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:41292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXVHIk7brgkOH-rIWRNwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:00.244148 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:41292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXVHIk7brgkOH-rIWROAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:05.211617 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.31:41302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXV7-sgTmmJoPuMdy74gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:06.152053 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:03:08.476694 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:53946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXWxj0p0SRWAqcjGF_DAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:09.466262 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:53946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXXRj0p0SRWAqcjGF_DwAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:12.099178 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:53950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXYMU6Sx0TG1YjmQi0awAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:14.022342 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:53950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXYsU6Sx0TG1YjmQi0bQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:16.499767 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.31:53952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXZKBJNF7axNlVR0Ud1gAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:18.707536 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:37158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXZsU6Sx0TG1YjmQi0cwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:20.722199 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:37174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXaAeiSKl8TjouI-YfHAAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:22.370686 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:37180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXar-sgTmmJoPuMdy78AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:23.783261 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:37188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXa3Ik7brgkOH-rIWRRAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:23.870640 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.244.43:43654] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmXa6t8Nd0UC_OcbVHQWwAAAI0"]
[Tue Mar 17 15:03:25.219158 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:37194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXbcU6Sx0TG1YjmQi0fQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:27.678897 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.241.31:37202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXbqt8Nd0UC_OcbVHQXQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:27.919577 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:37202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXb6t8Nd0UC_OcbVHQXwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:28.133789 2026] [proxy_fcgi:error] [pid 7437:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:03:28.399340 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.228.61:40638] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmXcL-sgTmmJoPuMdy7-gAAAsU"]
[Tue Mar 17 15:03:29.763403 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:56640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXcb-sgTmmJoPuMdy7_QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:33.327724 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.31:56656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXdb-sgTmmJoPuMdy8AgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:36.939312 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:56670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXeL-sgTmmJoPuMdy8DAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:40.004137 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:40500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXfAeiSKl8TjouI-YfIgAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:44.720043 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:40502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXgKBJNF7axNlVR0Ud3wAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:46.412816 2026] [mime_magic:error] [pid 9299:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:56288] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/opt/puppetlabs
[Tue Mar 17 15:03:48.527301 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:48626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXhKt8Nd0UC_OcbVHQZAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:48.847527 2026] [:error] [pid 17965:tid 140411616036608] [client 216.73.216.191:48829] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXhKt8Nd0UC_OcbVHQZQAAAI8"]
[Tue Mar 17 15:03:48.989320 2026] [:error] [pid 7437:tid 140411725141760] [client 216.73.216.191:31594] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXhAeiSKl8TjouI-YfLAAAA8I"]
[Tue Mar 17 15:03:50.121777 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:03:51.356895 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:48636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXh_PqhzTj3BvfDX-NiwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:54.256284 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:48640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXiqt8Nd0UC_OcbVHQZwAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:55.643223 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.128:41292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXi6BJNF7axNlVR0Ud5QAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:03:56.235632 2026] [:error] [pid 7437:tid 140411741927168] [client 216.73.216.191:14771] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXjAeiSKl8TjouI-YfMwAAA8A"]
[Tue Mar 17 15:03:57.828192 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:60128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXjb-sgTmmJoPuMdy8EwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:01.364182 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:60140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXkRj0p0SRWAqcjGF_NgAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:01.957427 2026] [:error] [pid 18380:tid 140411666392832] [client 216.73.216.191:26977] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXka4xEDsg_V3ESNZR0AAAAgk"]
[Tue Mar 17 15:04:05.257026 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:60150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXldY0UrI5A3LftIwCTgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:10.636755 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:35054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXmaBJNF7axNlVR0Ud7AAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:12.169777 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:04:15.512761 2026] [:error] [pid 2598:tid 140411641214720] [client 216.73.216.191:33701] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXnxj0p0SRWAqcjGF_RwAAAww"]
[Tue Mar 17 15:04:17.127537 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:35066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXoXIk7brgkOH-rIWRYQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:21.205580 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:48290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXpaBJNF7axNlVR0Ud-wAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:30.044923 2026] [:error] [pid 9299:tid 140411683178240] [client 216.73.216.191:10412] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXrr-sgTmmJoPuMdy8LQAAAsc"]
[Tue Mar 17 15:04:33.055059 2026] [:error] [pid 29151:tid 140411607643904] [client 216.73.216.191:38420] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXsfPqhzTj3BvfDX-NqQAAAdA"]
[Tue Mar 17 15:04:36.323031 2026] [:error] [pid 2598:tid 140411557287680] [client 216.73.216.191:21416] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXtBj0p0SRWAqcjGF_SQAAAxY"]
[Tue Mar 17 15:04:36.676845 2026] [:error] [pid 9299:tid 140411725141760] [client 216.73.216.191:19807] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXtL-sgTmmJoPuMdy8MwAAAsI"]
[Tue Mar 17 15:04:37.933795 2026] [proxy_fcgi:error] [pid 7004:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:04:58.631783 2026] [:error] [pid 6296:tid 140411674785536] [client 216.73.216.191:48660] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXynIk7brgkOH-rIWRhgAAAUg"]
[Tue Mar 17 15:04:58.674879 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:48296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXyvPqhzTj3BvfDX-NxAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:05:00.065944 2026] [proxy_fcgi:error] [pid 17965:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:05:00.411000 2026] [:error] [pid 2473:tid 140411674785536] [client 216.73.216.191:32622] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXzKBJNF7axNlVR0UeDQAAAAg"]
[Tue Mar 17 15:05:22.128494 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:05:23.575100 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:40218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmX46BJNF7axNlVR0UeIwAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:05:44.121775 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58056] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:05:45.788206 2026] [:error] [pid 19507:tid 140411674785536] [client 216.73.216.191:9766] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmX-dY0UrI5A3LftIwCpAAAAYg"]
[Tue Mar 17 15:05:51.213696 2026] [:error] [pid 2473:tid 140411666392832] [client 216.73.216.191:9477] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmX_6BJNF7axNlVR0UeMgAAAAk"]
[Tue Mar 17 15:05:57.615328 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:34214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYBXIk7brgkOH-rIWRrwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:06:03.139207 2026] [:error] [pid 7004:tid 140411716749056] [client 216.73.216.191:44312] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYC8U6Sx0TG1YjmQi0-QAAAoM"]
[Tue Mar 17 15:06:03.848569 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:43416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYC8U6Sx0TG1YjmQi0-gAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:06:08.373790 2026] [proxy_fcgi:error] [pid 17965:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:06:10.270598 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:40678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYEvPqhzTj3BvfDX-N8wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:06:14.802290 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:40688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYFr-sgTmmJoPuMdy8WgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:06:24.203884 2026] [:error] [pid 29151:tid 140411699963648] [client 216.73.216.191:31606] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYIPPqhzTj3BvfDX-N_gAAAcU"]
[Tue Mar 17 15:06:25.107348 2026] [:error] [pid 2598:tid 140411607643904] [client 216.73.216.191:40256] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYIRj0p0SRWAqcjGF_iwAAAxA"]
[Tue Mar 17 15:06:28.803822 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:49410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYJNY0UrI5A3LftIwCwQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:06:32.205988 2026] [proxy_fcgi:error] [pid 18380:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:06:41.807315 2026] [:error] [pid 19507:tid 140411716749056] [client 216.73.216.191:41970] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYMdY0UrI5A3LftIwC1gAAAYM"]
[Tue Mar 17 15:06:43.063221 2026] [core:alert] [pid 19507:tid 140411582465792] [client 74.7.241.31:52448] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var
[Tue Mar 17 15:06:54.125863 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:07:16.573810 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:07:30.310208 2026] [core:alert] [pid 2473:tid 140411699963648] [client 74.7.243.128:36494] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:07:40.090101 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33178] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:08:05.335305 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33840] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:08:07.390491 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYh3Ik7brgkOH-rIWSDwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:08:23.445840 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.244.43:46972] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmYl7-sgTmmJoPuMdy8uAAAAtA"]
[Tue Mar 17 15:08:28.126587 2026] [proxy_fcgi:error] [pid 9299:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:08:31.363820 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.228.61:34838] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmYn3Ik7brgkOH-rIWSJwAAAVQ"]
[Tue Mar 17 15:08:51.133808 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:09:13.121187 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:09:18.368520 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYzHIk7brgkOH-rIWSSwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:09:40.129788 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:09:49.065924 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:40190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY7MU6Sx0TG1YjmQi1uwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:09:51.420698 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:48966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY76BJNF7axNlVR0Ue-AAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:09:52.964609 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:48970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY8HIk7brgkOH-rIWSYAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:09:55.053764 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.243.128:59964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY864xEDsg_V3ESNZSoQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:09:55.808879 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:48972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY8weiSKl8TjouI-YgBgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:10:01.167542 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:10:14.252606 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZBr-sgTmmJoPuMdy9AgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:10:24.128823 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:10:29.655489 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:34528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZFRj0p0SRWAqcjGGAQwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:10:30.355436 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.243.128:33308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZFsU6Sx0TG1YjmQi14QAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:10:47.066937 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:10:50.007503 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:34528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZKhj0p0SRWAqcjGGAUwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:10:51.697272 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:34740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZK3Ik7brgkOH-rIWSfgAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:11:05.431093 2026] [access_compat:error] [pid 7004:tid 140411599251200] [client 70.54.45.205:54150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 15:11:09.129859 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:11:24.490055 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:34750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZTHIk7brgkOH-rIWSnAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:11:29.509886 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:43898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZUcU6Sx0TG1YjmQi2BwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:11:31.131559 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:11:32.439231 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:43910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZVAeiSKl8TjouI-YgMgAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:11:37.075032 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.241.31:43924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZWb-sgTmmJoPuMdy9QAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:11:53.144780 2026] [proxy_fcgi:error] [pid 17965:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:12:12.834920 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:41764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZfMU6Sx0TG1YjmQi2LgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:12:15.101808 2026] [proxy_fcgi:error] [pid 9299:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42640] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:12:32.847324 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:40802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZkBj0p0SRWAqcjGGAiAAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:12:38.143145 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43708] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:12:54.575405 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:42798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZpgeiSKl8TjouI-YgZgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:00.130309 2026] [proxy_fcgi:error] [pid 9299:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:13:04.885206 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.241.31:54898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZsL-sgTmmJoPuMdy9hgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:16.442712 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.243.128:46448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZvL-sgTmmJoPuMdy9lwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:22.124811 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:13:23.710194 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.244.43:53918] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmZw6t8Nd0UC_OcbVHRmQAAAJM"]
[Tue Mar 17 15:13:31.899224 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:51686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZy8U6Sx0TG1YjmQi2WAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:13:32.449534 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.228.61:33674] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmZzPPqhzTj3BvfDX-PAAAAAcs"]
[Tue Mar 17 15:13:35.172722 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.241.31:37858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZz7-sgTmmJoPuMdy9owAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:43.127116 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:13:53.593529 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.128:45004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ4aBJNF7axNlVR0UflgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:56.537074 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.128:56778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ5L-sgTmmJoPuMdy9pwAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:14:07.121799 2026] [proxy_fcgi:error] [pid 17965:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:14:13.495194 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:37860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ9Rj0p0SRWAqcjGGAvgAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:14:16.771585 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:47368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ-KBJNF7axNlVR0UfngAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:14:29.125784 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:14:51.433817 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:14:59.596558 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.128:56786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaIxj0p0SRWAqcjGGA3AAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:15:14.089805 2026] [proxy_fcgi:error] [pid 7004:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:15:22.838366 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.243.128:56786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaOhj0p0SRWAqcjGGA8AAAAwA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:15:26.821779 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:55866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaPq4xEDsg_V3ESNZTawAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:15:36.075526 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:15:44.680348 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:43752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaUHIk7brgkOH-rIWTCwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:15:49.249866 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.128:48566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaVaBJNF7axNlVR0UfyAAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:16:03.125811 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:16:27.473800 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51896] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:16:31.156412 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:55866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaf64xEDsg_V3ESNZTogAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:16:43.350281 2026] [core:alert] [pid 6296:tid 140411607643904] [client 74.7.241.31:37986] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root
[Tue Mar 17 15:16:49.073839 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:17:10.817902 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:17:13.410233 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.128:60584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaqa4xEDsg_V3ESNZTvgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:17.091030 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:37998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmardY0UrI5A3LftIwEVgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:18.865029 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:47582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmarr-sgTmmJoPuMdy98QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:21.356509 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:47596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmasAeiSKl8TjouI-YgtwAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:34.112881 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:17:35.184419 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.128:44672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmav7-sgTmmJoPuMdy9-wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:39.439192 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:47608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaw7-sgTmmJoPuMdy9_gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:42.217275 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:52270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaxtY0UrI5A3LftIwEcAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:45.036912 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:52286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmayfPqhzTj3BvfDX-PRgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:17:56.133253 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:18:18.069817 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:18:23.787049 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:43064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abma73Ik7brgkOH-rIWTSAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:18:25.751559 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.244.43:44238] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abma8a4xEDsg_V3ESNZTzgAAAhM"]
[Tue Mar 17 15:18:39.121816 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:18:42.363022 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.228.61:52670] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmbAsU6Sx0TG1YjmQi2wAAAApM"]
[Tue Mar 17 15:18:46.666771 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:49978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbBtY0UrI5A3LftIwEiwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:19:01.125787 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:19:24.057834 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:19:46.124417 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:08.149038 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:20.625268 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:40684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbZL-sgTmmJoPuMdy-RAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:30.098288 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58404] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:35.476514 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:56648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbcxj0p0SRWAqcjGGBQQAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:36.171426 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:56648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbdBj0p0SRWAqcjGGBQgAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:39.728543 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:58208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbd8U6Sx0TG1YjmQi3AAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:44.128020 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:58210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbfBj0p0SRWAqcjGGBRQAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:48.395698 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:58214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbgMU6Sx0TG1YjmQi3BgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:50.084582 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:49510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbgsU6Sx0TG1YjmQi3CAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:51.442047 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:49520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbg8U6Sx0TG1YjmQi3CgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:53.126332 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:53.193554 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:49530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbhcU6Sx0TG1YjmQi3DgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:55.411216 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:49534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbh8U6Sx0TG1YjmQi3EAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:59.333966 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:56084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbi_PqhzTj3BvfDX-PlgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:08.439234 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:56094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmblKt8Nd0UC_OcbVHSJwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:11.004501 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:42392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbl3Ik7brgkOH-rIWTeAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:13.364416 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:42396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbmaBJNF7axNlVR0UgVgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:15.121899 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:21:15.512348 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:42402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbm9Y0UrI5A3LftIwE2AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:21.443818 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:58866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmboaBJNF7axNlVR0UgXQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:22.875504 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.243.128:60892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbosU6Sx0TG1YjmQi3KAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:24.522105 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:58868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbpKt8Nd0UC_OcbVHSKAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:27.353577 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:59624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbp64xEDsg_V3ESNZUCwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:30.324624 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.241.31:59640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbqqt8Nd0UC_OcbVHSLQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:33.211209 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:59650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbrb-sgTmmJoPuMdy-YAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:38.021861 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:21:38.115952 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:59664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbstY0UrI5A3LftIwE4AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:44.308457 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:46150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbuL-sgTmmJoPuMdy-agAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:47.163420 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:46166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbu6BJNF7axNlVR0UgZQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:49.341237 2026] [:error] [pid 17965:tid 140411699963648] [client 74.7.243.128:43638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbvat8Nd0UC_OcbVHSNgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:21:52.023333 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:41306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbwNY0UrI5A3LftIwE6wAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:55.221995 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.31:41322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbw6BJNF7axNlVR0UgbAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:58.068106 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:60020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbxqt8Nd0UC_OcbVHSOAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:59.139152 2026] [proxy_fcgi:error] [pid 9299:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:22:01.069274 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.31:60034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbyb-sgTmmJoPuMdy-bwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:04.307696 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:60044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbzHIk7brgkOH-rIWTjAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:09.515504 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:57298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb0cU6Sx0TG1YjmQi3NwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:12.141976 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:57312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb1Kt8Nd0UC_OcbVHSPQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:15.106025 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:57314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb16BJNF7axNlVR0UgcQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:21.453950 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:22:21.484202 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:52514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb3Rj0p0SRWAqcjGGBYwAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:25.043244 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:52520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb4QeiSKl8TjouI-YhBQAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:27.555700 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:47708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb46t8Nd0UC_OcbVHSQAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:31.743846 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:47720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb56t8Nd0UC_OcbVHSRQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:34.992481 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.241.31:47728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb6qt8Nd0UC_OcbVHSRwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:37.166447 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:47730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb7QeiSKl8TjouI-YhBwAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:44.105934 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:22:47.087749 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:35594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb9NY0UrI5A3LftIwFAwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:47.088492 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.241.31:42992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb9a4xEDsg_V3ESNZUIwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:51.436489 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:54098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb-weiSKl8TjouI-YhDAAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:55.818698 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:54102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb_7-sgTmmJoPuMdy-fwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:58.331198 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:37944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcAq4xEDsg_V3ESNZUJQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:00.520795 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:38162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcBL-sgTmmJoPuMdy-gwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:03.139822 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:38324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcB6BJNF7axNlVR0UgegAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:05.347899 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:38452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcCcU6Sx0TG1YjmQi3QwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:06.141804 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:23:06.787407 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:38596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcCqt8Nd0UC_OcbVHSTwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:07.211945 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.243.128:46478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcC_PqhzTj3BvfDX-PsQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:08.343604 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:54916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcDKBJNF7axNlVR0UgfgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:12.561430 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:54930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcEHIk7brgkOH-rIWTnAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:16.435834 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:54942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcFPPqhzTj3BvfDX-PtQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:18.243820 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:35658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcFr-sgTmmJoPuMdy-hAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:21.039868 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:35664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcF_PqhzTj3BvfDX-PtgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:22.374705 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:35670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcGtY0UrI5A3LftIwFDgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:22.932663 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.243.128:45972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcGsU6Sx0TG1YjmQi3TwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:23.681940 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:35676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcG3Ik7brgkOH-rIWTnwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:26.260173 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.244.43:58076] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmcHqt8Nd0UC_OcbVHSVgAAAIo"]
[Tue Mar 17 15:23:27.419302 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:35692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcHweiSKl8TjouI-YhHQAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:28.125829 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:23:28.997901 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:52720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcIKt8Nd0UC_OcbVHSWAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:31.095361 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:52730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcI_PqhzTj3BvfDX-PuQAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:35.590595 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:52734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcJ8U6Sx0TG1YjmQi3VAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:37.719733 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:58364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcKfPqhzTj3BvfDX-PwAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:41.136586 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.241.31:58374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcLb-sgTmmJoPuMdy-jQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:43.033977 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:58378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcL3Ik7brgkOH-rIWTpAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:45.315919 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:58384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcMRj0p0SRWAqcjGGBjwAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:45.456075 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.228.61:43616] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmcMa4xEDsg_V3ESNZURAAAAhU"]
[Tue Mar 17 15:23:49.629354 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:35790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcNXIk7brgkOH-rIWTqwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:51.126043 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:23:52.419419 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.241.31:35804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcOKt8Nd0UC_OcbVHSYgAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:24:03.378970 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:35814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcQxj0p0SRWAqcjGGBlwAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:24:06.691697 2026] [mime_magic:error] [pid 19507:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:27611] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:24:13.033848 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:24:18.170658 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:60080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcUvPqhzTj3BvfDX-PzQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:24:28.402624 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.241.31:58960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcXL-sgTmmJoPuMdy-nwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:24:40.073922 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:02.294353 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:16.085301 2026] [mime_magic:error] [pid 2473:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:42966] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Tue Mar 17 15:25:24.132435 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:34.191391 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.243.128:34560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcnhj0p0SRWAqcjGGBwgAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:25:38.015567 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:35642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcoqBJNF7axNlVR0Ug7gAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:25:52.106442 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:54.714784 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:35354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcssU6Sx0TG1YjmQi3oAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:25:57.120257 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:38760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmctb-sgTmmJoPuMdy-ygAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:26:14.137802 2026] [proxy_fcgi:error] [pid 18380:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:26:36.125783 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35634] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:26:42.439156 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.128:35642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmc4qBJNF7axNlVR0UhFQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:26:51.798351 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:60380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmc68U6Sx0TG1YjmQi3vAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:26:58.121736 2026] [proxy_fcgi:error] [pid 17965:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:27:18.905796 2026] [mime_magic:error] [pid 2598:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:55341] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:27:20.124394 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:27:43.122686 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:28:06.121772 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:28:27.585584 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.244.43:33190] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmdS9Y0UrI5A3LftIwFlQAAAZI"]
[Tue Mar 17 15:28:28.129884 2026] [proxy_fcgi:error] [pid 9299:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:28:47.582567 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.228.61:38018] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmdX_PqhzTj3BvfDX-QOQAAAdg"]
[Tue Mar 17 15:28:49.156538 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:12.045834 2026] [proxy_fcgi:error] [pid 17965:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:17.629554 2026] [mime_magic:error] [pid 19507:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:6979] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:29:17.629752 2026] [access_compat:error] [pid 19507:tid 140411599251200] [client 216.73.216.191:6979] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 15:29:34.057905 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:38.374735 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:46002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdksU6Sx0TG1YjmQi4KgAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:29:40.260939 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:58288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdlKt8Nd0UC_OcbVHSygAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:29:45.327304 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:58304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdmMU6Sx0TG1YjmQi4LgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:29:46.601663 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.241.31:58318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdmqt8Nd0UC_OcbVHSywAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:29:49.620466 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:36430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdnRj0p0SRWAqcjGGCPgAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:29:54.448198 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:36446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdoq4xEDsg_V3ESNZUzgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:29:57.097940 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:58.060890 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.128:53126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdpQeiSKl8TjouI-Yh3gAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:29:59.215764 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:36454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdpxj0p0SRWAqcjGGCQgAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:30:18.109811 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:30:19.940807 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:57506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdu8U6Sx0TG1YjmQi4PwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:30:21.556055 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.241.31:35100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdvat8Nd0UC_OcbVHS2AAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:30:25.832072 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.243.128:54908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdwXIk7brgkOH-rIWUNQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:30:41.125794 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40278] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:30:45.208039 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:35112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd1dY0UrI5A3LftIwF8AAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:30:48.423316 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:60822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd2Bj0p0SRWAqcjGGCUwAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:30:55.797273 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:45162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd33Ik7brgkOH-rIWUQAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:31:09.131530 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:31:22.523440 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:49148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd-qBJNF7axNlVR0UhjQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:31:24.319779 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:60134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd_PPqhzTj3BvfDX-QdgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:31:33.129778 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:31:39.743139 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:45204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeC64xEDsg_V3ESNZU7wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:31:44.827620 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.241.31:50184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeEKBJNF7axNlVR0UhmQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:31:46.140418 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.241.31:50196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeEqt8Nd0UC_OcbVHS6QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:31:53.005806 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:56908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeGdY0UrI5A3LftIwGPAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:31:56.139290 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:32:19.137650 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:32:26.799151 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.128:54804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeOhj0p0SRWAqcjGGCdAAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:32:42.989788 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:05.053076 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:22.659471 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.128:37038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmecgeiSKl8TjouI-YiIAAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:33:26.735710 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.128:38848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmedq4xEDsg_V3ESNZVDwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:33:27.250822 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.244.43:50832] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmedweiSKl8TjouI-YiIQAAA8U"]
[Tue Mar 17 15:33:28.494997 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:58950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeeBj0p0SRWAqcjGGCmQAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:33:29.069806 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:51.122948 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:52.809916 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.228.61:39172] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmekL-sgTmmJoPuMdy_kwAAAsI"]
[Tue Mar 17 15:33:54.704268 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.243.128:38860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeknIk7brgkOH-rIWUkgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:34:13.129804 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:34:16.928236 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:48824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeqMU6Sx0TG1YjmQi4uAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:34:35.141836 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:34:56.057826 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:35:17.121775 2026] [proxy_fcgi:error] [pid 9299:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:35:27.707932 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:59838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abme78U6Sx0TG1YjmQi42QAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:35:39.273811 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:02.061887 2026] [proxy_fcgi:error] [pid 9299:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:24.153808 2026] [proxy_fcgi:error] [pid 29151:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:46.125849 2026] [proxy_fcgi:error] [pid 9299:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:50.565970 2026] [core:alert] [pid 6296:tid 140411565680384] [client 74.7.241.31:40160] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/sys/fs
[Tue Mar 17 15:37:07.136382 2026] [proxy_fcgi:error] [pid 9299:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:37:29.059764 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:37:36.591220 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:47104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmfcKBJNF7axNlVR0UiIQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:37:51.137796 2026] [proxy_fcgi:error] [pid 17965:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:38:13.126047 2026] [proxy_fcgi:error] [pid 7004:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:38:28.179292 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.244.43:37122] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmfpHIk7brgkOH-rIWU-wAAAUo"]
[Tue Mar 17 15:38:36.299176 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:39742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmfrBj0p0SRWAqcjGGDCAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:38:37.121071 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48640] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:38:37.141450 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.243.128:50150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmfrfPqhzTj3BvfDX-RkAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:38:46.239124 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:35988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmftsU6Sx0TG1YjmQi5HgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:38:59.117955 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:39:02.541690 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.228.61:60284] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmfxnIk7brgkOH-rIWVAwAAAUg"]
[Tue Mar 17 15:39:21.122872 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:39:22.975880 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.241.31:42908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf2q4xEDsg_V3ESNZVmwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:39:24.691189 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:42896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf3KBJNF7axNlVR0UiQAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:39:26.236742 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.241.31:42900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf3qt8Nd0UC_OcbVHTnAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:39:27.732436 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:43332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf33Ik7brgkOH-rIWVDQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:39:43.049822 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:39:45.075115 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:60194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf8fPqhzTj3BvfDX-RtgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:39:47.075921 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.128:34518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf86t8Nd0UC_OcbVHTqQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:40:05.135180 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50232] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:40:15.805007 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.243.128:34524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgD3Ik7brgkOH-rIWVKwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:40:27.151603 2026] [proxy_fcgi:error] [pid 7437:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:40:49.130629 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50964] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:41:02.577898 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.128:41186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgPq4xEDsg_V3ESNZV1AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:41:11.043163 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:41:33.049834 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:41:40.627108 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:43338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgZNY0UrI5A3LftIwHSQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:41:49.862914 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.243.128:36502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgbXIk7brgkOH-rIWVZQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:41:51.619045 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:55178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgbnIk7brgkOH-rIWVZwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:41:55.095488 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:38228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgc6BJNF7axNlVR0UihQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:41:55.121797 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:42:05.958120 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:38234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgffPqhzTj3BvfDX-SJAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:42:17.145801 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:42:31.900920 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.243.128:56556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmglxj0p0SRWAqcjGGDdwAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:42:36.431162 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.243.128:49480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgnBj0p0SRWAqcjGGDegAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:42:39.125824 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:42:53.699195 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:38168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgrdY0UrI5A3LftIwHjgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:43:01.133786 2026] [proxy_fcgi:error] [pid 7004:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:43:04.667458 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:48890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmguNY0UrI5A3LftIwHlAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:43:14.621582 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:54482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgwtY0UrI5A3LftIwHpAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:43:19.920192 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:46386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgx6t8Nd0UC_OcbVHT6QAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:43:23.057837 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:43:31.407356 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.241.31:48650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg08U6Sx0TG1YjmQi5gQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:43:46.322322 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:43:52.837336 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:46756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg6NY0UrI5A3LftIwH0AAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:44:00.809075 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.241.31:42668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg8Kt8Nd0UC_OcbVHT_gAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:44:09.377774 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:44:10.347023 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:44740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg-geiSKl8TjouI-YjBQAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:15.274436 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:44752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg_7-sgTmmJoPuMdzAbAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:21.440738 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:54762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhBdY0UrI5A3LftIwH4gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:23.489315 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.128:58040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhB64xEDsg_V3ESNZWDgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:31.122578 2026] [proxy_fcgi:error] [pid 17965:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:44:33.811308 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:44754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhEb-sgTmmJoPuMdzAdgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:44:53.129800 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:45:16.145797 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56274] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:45:24.888881 2026] [core:alert] [pid 2598:tid 140411607643904] [client 74.7.243.128:58926] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/kbd/consolefonts
[Tue Mar 17 15:45:38.134053 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:46:00.149783 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:46:01.439078 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:53286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhaQeiSKl8TjouI-YjSgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:46:05.273351 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.31:51366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhbat8Nd0UC_OcbVHUMQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:46:15.375564 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:51380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhd3Ik7brgkOH-rIWVzgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:46:22.141872 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:46:44.126677 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:47:11.033817 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:47:32.118142 2026] [proxy_fcgi:error] [pid 9299:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:47:54.139598 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:48:16.125806 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:48:37.131370 2026] [proxy_fcgi:error] [pid 17965:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60880] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:48:46.369162 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:53764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiDgeiSKl8TjouI-YjowAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:49:00.098553 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33154] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:49:16.192088 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:48176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiLNY0UrI5A3LftIwIZAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:49:22.129838 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:49:44.093989 2026] [proxy_fcgi:error] [pid 17965:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:50:06.161819 2026] [proxy_fcgi:error] [pid 9299:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:50:06.501433 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:55592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiXcU6Sx0TG1YjmQi6MwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:50:10.958679 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:57722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiYsU6Sx0TG1YjmQi6PwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:50:13.871326 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:57726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiZQeiSKl8TjouI-YjwgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:50:33.369828 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:50:43.208254 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:57740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmig_PqhzTj3BvfDX-TCwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:50:43.887478 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:57740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmig_PqhzTj3BvfDX-TDAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:50:55.138190 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:51:08.869856 2026] [mime_magic:error] [pid 6296:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:40822] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice/node_exporter.service
[Tue Mar 17 15:51:08.870039 2026] [access_compat:error] [pid 6296:tid 140411725141760] [client 74.7.243.128:40822] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice/node_exporter.service
[Tue Mar 17 15:51:17.132176 2026] [proxy_fcgi:error] [pid 17965:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:51:23.027685 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.128:42194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiqweiSKl8TjouI-Yj2AAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:24.808707 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.243.128:35592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmirL-sgTmmJoPuMdzBGAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:26.276573 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:35598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmirnIk7brgkOH-rIWWpAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:27.663733 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.128:35600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmirweiSKl8TjouI-Yj2gAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:29.592614 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.128:58800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmisaBJNF7axNlVR0UjYAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:32.703124 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.128:58814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmisweiSKl8TjouI-Yj3gAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:37.529620 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.128:58826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiua4xEDsg_V3ESNZXLgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:39.134086 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:51:40.491198 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.243.128:55622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmivPPqhzTj3BvfDX-TJgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:42.403331 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.243.128:55622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmivvPqhzTj3BvfDX-TKAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:44.262442 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.243.128:55628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiwMU6Sx0TG1YjmQi6bgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:47.331196 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.128:55634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiwqt8Nd0UC_OcbVHUuAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:48.955546 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.243.128:55638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmixMU6Sx0TG1YjmQi6cAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:50.306558 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.243.128:58698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmixnIk7brgkOH-rIWWtgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:51.888068 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.243.128:58702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmixxj0p0SRWAqcjGGEUAAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:53.435382 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.128:58714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiyat8Nd0UC_OcbVHUuwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:52:00.133898 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:52:01.472577 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:34440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi0dY0UrI5A3LftIwIvQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:52:03.303066 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.128:34456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi06BJNF7axNlVR0UjbgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:52:04.941260 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.128:34468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi1AeiSKl8TjouI-Yj5wAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:52:06.471377 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:34482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi1hj0p0SRWAqcjGGEVAAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:06.952016 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:33086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi1r-sgTmmJoPuMdzBNwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:52:07.915412 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:34498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi18U6Sx0TG1YjmQi6dgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:09.620626 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.31:52624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi2KBJNF7axNlVR0UjewAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:16.191355 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:52638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi4AeiSKl8TjouI-Yj7QAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:22.517315 2026] [proxy_fcgi:error] [pid 9299:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:52:44.109861 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:52:57.413326 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.243.128:43176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjCb-sgTmmJoPuMdzBWQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:53:07.138166 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:53:12.446025 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.241.31:42566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjGKt8Nd0UC_OcbVHU4wAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:53:19.908287 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.31:42566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjH6t8Nd0UC_OcbVHU6gAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:53:29.153804 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:53:30.166707 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.244.43:37748] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmjKr-sgTmmJoPuMdzBcwAAAsc"]
[Tue Mar 17 15:53:43.211055 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.243.128:43176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjN7-sgTmmJoPuMdzBfwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:53:51.129781 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:53:58.410479 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.243.128:34072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjRvPqhzTj3BvfDX-TVwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:54:01.884300 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:52950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjScU6Sx0TG1YjmQi6swAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:54:03.135632 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.243.128:38418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjS7-sgTmmJoPuMdzBiwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:54:19.078685 2026] [proxy_fcgi:error] [pid 17965:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:54:21.152656 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.61:59576] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmjXaBJNF7axNlVR0UjvwAAABU"]
[Tue Mar 17 15:54:27.336034 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:51882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjY7-sgTmmJoPuMdzBtAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:54:41.081896 2026] [proxy_fcgi:error] [pid 18380:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41112] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:54:49.107590 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:42272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjeRj0p0SRWAqcjGGEqQAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:55:00.255034 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:39498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjhKBJNF7axNlVR0Uj1wAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:55:03.157443 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:55:07.707177 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:52962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjixj0p0SRWAqcjGGEwQAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:55:25.125799 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42278] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:55:26.229052 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:33496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjnq4xEDsg_V3ESNZXiwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:55:47.169784 2026] [proxy_fcgi:error] [pid 17965:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:55:49.764441 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:42026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjtfPqhzTj3BvfDX-TmgAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:55:51.505569 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:48520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjt6t8Nd0UC_OcbVHVKQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:56:09.141866 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:56:27.067753 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:48532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmj2xj0p0SRWAqcjGGE8AAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:56:31.145787 2026] [proxy_fcgi:error] [pid 6296:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:56:38.593012 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:41058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmj5qt8Nd0UC_OcbVHVRwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:56:53.125816 2026] [proxy_fcgi:error] [pid 29151:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:57:15.127090 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45180] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:57:17.015421 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:46856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkDXIk7brgkOH-rIWXUQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:57:20.211140 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:35280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkEKBJNF7axNlVR0UkIgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:57:37.127879 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45640] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:57:38.959914 2026] [:error] [pid 25581:tid 140411624429312] [client 74.7.241.31:35290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkIhLxOFNDSaSvJXBW_gAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:57:59.140479 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:58:21.125796 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:58:42.145825 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:58:49.266311 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.244.43:49438] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmkafPqhzTj3BvfDX-T7AAAAcQ"]
[Tue Mar 17 15:59:04.142796 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:59:06.691802 2026] [:error] [pid 25048:tid 140411624429312] [client 74.7.241.31:55610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkenXXq9-mGshjHG3MtQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:59:12.231459 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:54538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkgIh-PF_25v4hFRB3BQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:59:26.137926 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:59:26.351076 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:54538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkjoh-PF_25v4hFRB3CgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:59:26.907197 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.228.61:49124] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmkjqt8Nd0UC_OcbVHVgwAAAII"]
[Tue Mar 17 15:59:36.539111 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:57112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkmHIk7brgkOH-rIWXtAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:59:48.130089 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:00:10.121819 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:00:32.135920 2026] [proxy_fcgi:error] [pid 17965:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:00:54.125827 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:01:16.157797 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:01:38.133846 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:01:59.137947 2026] [proxy_fcgi:error] [pid 25048:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:02:15.483777 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.31:41208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlN6t8Nd0UC_OcbVHV6gAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:02:17.880839 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:48448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlOdY0UrI5A3LftIwJ7QAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:02:21.149771 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:02:23.722760 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:48450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlPtY0UrI5A3LftIwJ8gAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:02:33.891141 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:48464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlScU6Sx0TG1YjmQi7gAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:02:43.127739 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:02:50.487708 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:48856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlWnIk7brgkOH-rIWYBwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:03:05.138179 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54544] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:03:24.095473 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:47000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlfL-sgTmmJoPuMdzClgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:03:27.137775 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:03:28.934498 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:41742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlgNa6ubjKNq_cu4YUVgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:03:30.423829 2026] [:error] [pid 27444:tid 140411658000128] [client 74.7.241.31:53756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlgr8DGvJ77N8btoXh4QAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:03:49.141802 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:03:50.914327 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.244.43:50138] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmllqt8Nd0UC_OcbVHWHQAAAJM"]
[Tue Mar 17 16:04:11.145971 2026] [proxy_fcgi:error] [pid 26033:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:04:28.819702 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.228.61:48186] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmlvL-sgTmmJoPuMdzCrgAAAs0"]
[Tue Mar 17 16:04:32.768717 2026] [:error] [pid 26033:tid 140411691570944] [client 74.7.241.31:53772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlwPwd3-i0LWTVPppMqAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:04:34.137830 2026] [proxy_fcgi:error] [pid 18380:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:04:34.952644 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:43390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlwnIk7brgkOH-rIWYNQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:04:55.125819 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:05:17.133827 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:05:31.823666 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:43396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abml-_PqhzTj3BvfDX-UjwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:05:39.141804 2026] [proxy_fcgi:error] [pid 25581:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:05:44.427159 2026] [:error] [pid 25581:tid 140411582465792] [client 74.7.241.31:43626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmCBLxOFNDSaSvJXBXpQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:05:45.812465 2026] [:error] [pid 27444:tid 140411582465792] [client 74.7.241.31:43200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmCb8DGvJ77N8btoXiBwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:05:50.133010 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.241.31:43210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmDL-sgTmmJoPuMdzC0QAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:05:51.861688 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.31:58246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmD6t8Nd0UC_OcbVHWiAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:00.505973 2026] [:error] [pid 25581:tid 140411565680384] [client 74.7.241.31:58262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmFxLxOFNDSaSvJXBXtgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:05.129795 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:06:07.475505 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:56890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmH7-sgTmmJoPuMdzC7wAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:09.342800 2026] [:error] [pid 25581:tid 140411565680384] [client 74.7.241.31:53816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmIRLxOFNDSaSvJXBXuQAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:10.699362 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:53826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmIgeiSKl8TjouI-YlJQAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:12.186117 2026] [:error] [pid 25581:tid 140411548894976] [client 74.7.241.31:53830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmJBLxOFNDSaSvJXBXuwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:13.843033 2026] [:error] [pid 25048:tid 140411565680384] [client 74.7.241.31:53846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmJXXXq9-mGshjHG3NYAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:15.166976 2026] [:error] [pid 25581:tid 140411708356352] [client 74.7.241.31:53862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmJxLxOFNDSaSvJXBXvAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:16.526544 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:53866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmKL-sgTmmJoPuMdzC9AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:17.987564 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.241.31:50250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmKb-sgTmmJoPuMdzC9QAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:20.042100 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:50256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmK4h-PF_25v4hFRB35AAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:23.939463 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:50270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmL7-sgTmmJoPuMdzC9gAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:25.988428 2026] [:error] [pid 25581:tid 140411557287680] [client 74.7.241.31:50282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmMRLxOFNDSaSvJXBXvgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:27.799221 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:35862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmM9Y0UrI5A3LftIwKTwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:28.138493 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:06:29.639542 2026] [:error] [pid 25048:tid 140411624429312] [client 74.7.241.31:35864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmNXXXq9-mGshjHG3NZgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:34.927126 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:35868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmOta6ubjKNq_cu4YUxwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:36.315050 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.241.31:35880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmPL-sgTmmJoPuMdzC9wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:37.585445 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:56540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmPb-sgTmmJoPuMdzC_QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:38.957681 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:56544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmPnIk7brgkOH-rIWYYwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:40.274972 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:56556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmQNY0UrI5A3LftIwKUgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:41.567354 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:56570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmQXIk7brgkOH-rIWYaQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:43.727676 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:56586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmQnIk7brgkOH-rIWYbAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:45.082211 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:56588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmRXIk7brgkOH-rIWYbwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:47.899561 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:56596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmR_PqhzTj3BvfDX-UpAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:49.187187 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:39666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmScU6Sx0TG1YjmQi7zQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:50.150950 2026] [proxy_fcgi:error] [pid 27444:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:06:51.516632 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:39668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmS8U6Sx0TG1YjmQi7zwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:52.827291 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:39682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmTAeiSKl8TjouI-YlJwAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:54.172000 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:39698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmTtY0UrI5A3LftIwKVAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:55.645968 2026] [:error] [pid 25581:tid 140411607643904] [client 74.7.241.31:39708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmTxLxOFNDSaSvJXBXwAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:58.059512 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:39712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmUqBJNF7axNlVR0UllgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:59.853685 2026] [:error] [pid 25048:tid 140411548894976] [client 74.7.241.31:40956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmU3XXq9-mGshjHG3NaAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:01.332051 2026] [:error] [pid 25581:tid 140411548894976] [client 74.7.241.31:40970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmVRLxOFNDSaSvJXBXwwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:02.916622 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:40972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmVq4xEDsg_V3ESNZYmAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:08.655449 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:40986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmXNY0UrI5A3LftIwKWgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:14.160244 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:37074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmYtY0UrI5A3LftIwKYAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:17.060154 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:37086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmZRj0p0SRWAqcjGGGUAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:17.149829 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:07:24.999746 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:55434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmbBj0p0SRWAqcjGGGWgAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:07:40.137781 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35896] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:07:54.499204 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:55444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmir-sgTmmJoPuMdzDFwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:07:57.464158 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:36446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmjYh-PF_25v4hFRB37wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:07:59.171144 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:52068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmj3Ik7brgkOH-rIWYrQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:08:02.158925 2026] [proxy_fcgi:error] [pid 25048:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:08:24.135834 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37758] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:08:45.133786 2026] [proxy_fcgi:error] [pid 26033:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:08:51.239466 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.244.43:48298] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmmw6t8Nd0UC_OcbVHWrQAAAIM"]
[Tue Mar 17 16:09:06.129868 2026] [proxy_fcgi:error] [pid 18380:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:09:12.106936 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:52074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmm14h-PF_25v4hFRB4HgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:09:20.734982 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:43148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmm4K4xEDsg_V3ESNZYrAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:09:24.087076 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:60836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmm5Bj0p0SRWAqcjGGG1AAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:09:27.137405 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:09:29.739980 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.228.61:45608] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmm6XIk7brgkOH-rIWY9QAAAUQ"]
[Tue Mar 17 16:09:49.045879 2026] [proxy_fcgi:error] [pid 9299:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:09:51.879061 2026] [access_compat:error] [pid 6296:tid 140411649607424] [client 66.249.74.169:35633] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/buy.php
[Tue Mar 17 16:09:58.330130 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:60852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnBnIk7brgkOH-rIWZEgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:10:01.096736 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:35342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnCQeiSKl8TjouI-YlOAAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:10:09.423501 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:35354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnEYh-PF_25v4hFRB4KgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:10:11.121823 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:10:32.137800 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:10:54.185822 2026] [proxy_fcgi:error] [pid 18380:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:11:16.149794 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:11:34.778731 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:55442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnZvPqhzTj3BvfDX-VDAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:11:37.069821 2026] [proxy_fcgi:error] [pid 9299:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:11:44.131960 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:43534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmncKt8Nd0UC_OcbVHWwgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:11:58.135151 2026] [proxy_fcgi:error] [pid 25581:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:12:09.408483 2026] [:error] [pid 25048:tid 140411548894976] [client 74.7.241.31:43550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmniXXXq9-mGshjHG3OEgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:12:19.129995 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:12:41.673796 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:04.153808 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:07.287413 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:36790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnw9Y0UrI5A3LftIwKsQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:13:09.114767 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:38236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnxa4xEDsg_V3ESNZYxQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:13:22.968469 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:38238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn0qBJNF7axNlVR0Ul3gAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:13:25.117830 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:31.175088 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:41678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn26t8Nd0UC_OcbVHW5AAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:13:35.387128 2026] [:error] [pid 25048:tid 140411582465792] [client 74.7.241.31:55356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn3HXXq9-mGshjHG3OGgAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:13:46.033864 2026] [proxy_fcgi:error] [pid 18380:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:49.387703 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:49912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn7cU6Sx0TG1YjmQi8JwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:13:55.124421 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.244.43:34610] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmn8xj0p0SRWAqcjGGHCwAAAxA"]
[Tue Mar 17 16:13:59.966455 2026] [access_compat:error] [pid 6296:tid 140411725141760] [client 216.73.216.191:51704] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 16:14:08.069830 2026] [proxy_fcgi:error] [pid 17965:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:14:18.670695 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:54156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoCvPqhzTj3BvfDX-VPQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:14:28.189862 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:36552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoFPPqhzTj3BvfDX-VSwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:14:29.898408 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.228.61:41426] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmoFfPqhzTj3BvfDX-VTQAAAcY"]
[Tue Mar 17 16:14:30.121801 2026] [proxy_fcgi:error] [pid 6296:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:14:31.099467 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:53608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoF8U6Sx0TG1YjmQi8LwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:14:52.125817 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:15:13.129828 2026] [proxy_fcgi:error] [pid 25048:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51450] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:15:35.169817 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:15:51.699479 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:53622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoZ6t8Nd0UC_OcbVHXMwAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:15:59.122383 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:16:01.031271 2026] [:error] [pid 25048:tid 140411674785536] [client 74.7.241.31:54562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmocXXXq9-mGshjHG3OnwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:16:03.228104 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:41606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoc9Y0UrI5A3LftIwK4wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:16:20.126095 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:16:22.448062 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:41612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmohta6ubjKNq_cu4YV-gAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:16:37.585983 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:42990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoldY0UrI5A3LftIwK9QAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:16:41.125831 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:17:02.070271 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:17:12.331314 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:48326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmot4h-PF_25v4hFRB4ywAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:17:14.701235 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:32836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmounIk7brgkOH-rIWZoAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:17:21.391115 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:32850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmowda6ubjKNq_cu4YWCQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:17:24.117802 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:17:26.360855 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:44996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoxoh-PF_25v4hFRB40gAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:17:30.319785 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:59156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoysU6Sx0TG1YjmQi8WgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:17:45.073846 2026] [proxy_fcgi:error] [pid 29151:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:06.152704 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:28.158235 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56082] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:42.720918 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.241.31:59172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpEq4xEDsg_V3ESNZZNwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:18:47.109689 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.243.128:52914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpFxj0p0SRWAqcjGGHbAAAAwo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:18:50.137944 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56414] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:55.038223 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.244.43:34758] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmpH8U6Sx0TG1YjmQi8aAAAApE"]
[Tue Mar 17 16:18:55.637720 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.128:46262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpHweiSKl8TjouI-Yl7gAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:03.355099 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:33356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpJ9a6ubjKNq_cu4YWXAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:19:04.340059 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:50774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpKHIk7brgkOH-rIWZzQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:07.703648 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.241.31:37880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpK64xEDsg_V3ESNZZPgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:09.450014 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:33124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpLa4xEDsg_V3ESNZZQQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:10.830918 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:33132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpLta6ubjKNq_cu4YWXQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:11.034059 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:19:12.349151 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:33146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpMNY0UrI5A3LftIwLDwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:14.107424 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.31:33154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpMqt8Nd0UC_OcbVHXWAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:20.519562 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.31:41960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpOKt8Nd0UC_OcbVHXXAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:21.832603 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpOda6ubjKNq_cu4YWXwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:23.509118 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:41976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpO_PqhzTj3BvfDX-VhAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:24.871998 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:41984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpPMU6Sx0TG1YjmQi8cQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:26.277573 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:41990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpPta6ubjKNq_cu4YWYQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:28.830064 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:57026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpQNY0UrI5A3LftIwLEwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:30.137964 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:57040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpQoh-PF_25v4hFRB44gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:30.236135 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.228.61:49326] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmpQqBJNF7axNlVR0UmeAAAAAQ"]
[Tue Mar 17 16:19:31.473236 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:57054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpQ_PqhzTj3BvfDX-VhwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:32.093869 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57006] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:19:33.409390 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:57068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpRXIk7brgkOH-rIWZ1QAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:34.726007 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:57072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpRqt8Nd0UC_OcbVHXYAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:36.205585 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:57082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpSIh-PF_25v4hFRB44wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:37.543268 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:42494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpSQeiSKl8TjouI-Yl-AAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:38.898127 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:42504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpSvPqhzTj3BvfDX-ViwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:40.254611 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:42514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpTNa6ubjKNq_cu4YWYgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:42.971405 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:42526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpTtY0UrI5A3LftIwLHQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:43.127164 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:52386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpTxj0p0SRWAqcjGGHjgAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:19:44.282960 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:42528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUIh-PF_25v4hFRB45gAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:44.434568 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.243.128:33028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUPPqhzTj3BvfDX-VjQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:19:46.206793 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:33044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUta6ubjKNq_cu4YWYwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:46.207455 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:42542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUa4xEDsg_V3ESNZZRgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:47.604045 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:50486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpU4h-PF_25v4hFRB47AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:48.914789 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:50502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpVNY0UrI5A3LftIwLIgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:51.415832 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:50518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpVtY0UrI5A3LftIwLJAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:52.703012 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:50522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpWIh-PF_25v4hFRB48QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:54.125795 2026] [proxy_fcgi:error] [pid 25048:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57398] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:19:54.581000 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:50532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpWsU6Sx0TG1YjmQi8dgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:56.208271 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:50542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpXHIk7brgkOH-rIWZ2wAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:57.527163 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:54150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpXXIk7brgkOH-rIWZ3AAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:59.942485 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:54154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpX_PqhzTj3BvfDX-VkQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:01.296472 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:54162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpYda6ubjKNq_cu4YWaQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:03.259435 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:54164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpY64xEDsg_V3ESNZZTAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:04.233513 2026] [access_compat:error] [pid 29151:tid 140411624429312] [client 216.73.216.191:57158] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/buy.php
[Tue Mar 17 16:20:05.027322 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:54172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpZQeiSKl8TjouI-Yl-gAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:06.422127 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:54180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpZqBJNF7axNlVR0UmfwAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:07.723306 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:35958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpZxj0p0SRWAqcjGGHlAAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:09.089616 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:35970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpada6ubjKNq_cu4YWbQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:11.303570 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:35984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpata6ubjKNq_cu4YWbgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:12.612681 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:35986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpbNa6ubjKNq_cu4YWcgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:13.962037 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:36000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpbQeiSKl8TjouI-Yl_gAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:15.269676 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:36014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpbxj0p0SRWAqcjGGHlgAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:16.075271 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:20:16.547883 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:36026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpcNY0UrI5A3LftIwLJwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:17.831779 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:48644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpcYh-PF_25v4hFRB5CgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:19.151675 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:48654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpc6BJNF7axNlVR0UmgwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:20.916436 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:48664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpdPPqhzTj3BvfDX-VmQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:22.409698 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:48670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpdsU6Sx0TG1YjmQi8gwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:23.683547 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:48686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpdxj0p0SRWAqcjGGHnQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:25.136058 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.241.31:48688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpea4xEDsg_V3ESNZZUAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:26.435444 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:48692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpevPqhzTj3BvfDX-VngAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:27.746734 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:56078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpexj0p0SRWAqcjGGHnwAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:29.650801 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.241.31:56088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpfQeiSKl8TjouI-YmBAAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:30.946735 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:56092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpfsU6Sx0TG1YjmQi8iAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:32.255902 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:56108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpgMU6Sx0TG1YjmQi8igAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:34.016937 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:56114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpgvPqhzTj3BvfDX-VpAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:34.153566 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.243.128:33052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpgoh-PF_25v4hFRB5HQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:20:35.322343 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:56116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpg_PqhzTj3BvfDX-VqAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:36.690365 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:56128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmphK4xEDsg_V3ESNZZUwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:37.137774 2026] [proxy_fcgi:error] [pid 7004:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58040] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:20:38.435532 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:33340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmphvPqhzTj3BvfDX-VrAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:39.733579 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:33354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmphxj0p0SRWAqcjGGHpAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:41.030266 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:33366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpiRj0p0SRWAqcjGGHqAAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:42.397414 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:33376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpisU6Sx0TG1YjmQi8jQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:44.839230 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:33388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpjBj0p0SRWAqcjGGHrAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:47.396379 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:33394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpj9a6ubjKNq_cu4YWfgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:48.904902 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:40012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpkIh-PF_25v4hFRB5IAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:50.532915 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:40016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpkgeiSKl8TjouI-YmDgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:51.828110 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:40032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpkweiSKl8TjouI-YmEAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:53.164073 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:40034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmplfPqhzTj3BvfDX-VsQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:54.476346 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:40050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmplnIk7brgkOH-rIWZ5wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:55.782911 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:40066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpl_PqhzTj3BvfDX-VtQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:57.138064 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:40072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpmfPqhzTj3BvfDX-VtwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:59.129816 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58408] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:20:59.555508 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.31:44668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpm6BJNF7axNlVR0UmkgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:02.055306 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:44672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpngeiSKl8TjouI-YmFAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:03.366800 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:44680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpn9Y0UrI5A3LftIwLNwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:03.866249 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.128:46348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpn64xEDsg_V3ESNZZbQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:05.744233 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:44688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpoRj0p0SRWAqcjGGHtgAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:07.232880 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:44702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpo4h-PF_25v4hFRB5JwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:08.547892 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:45078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmppPPqhzTj3BvfDX-VugAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:10.900793 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:45084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmppgeiSKl8TjouI-YmGwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:13.256418 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:45098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpqcU6Sx0TG1YjmQi8mgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:16.656886 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:45100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmprIh-PF_25v4hFRB5LAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:21.562639 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:42908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpsdY0UrI5A3LftIwLTAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:22.136569 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:21:23.274222 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:48838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmps4h-PF_25v4hFRB5MQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:21:42.548426 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:48856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpxsU6Sx0TG1YjmQi8twAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:42.943134 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:53662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpxhj0p0SRWAqcjGGHzgAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:43.133862 2026] [proxy_fcgi:error] [pid 7004:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:21:53.048160 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:52548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmp0dY0UrI5A3LftIwLXgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:22:10.129805 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:22:28.665434 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:43524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmp9K4xEDsg_V3ESNZZkQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:22:31.125885 2026] [proxy_fcgi:error] [pid 17965:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:22:58.118985 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60098] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:23:18.301117 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:50970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqJoh-PF_25v4hFRB5WgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:20.045191 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:52056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqKBj0p0SRWAqcjGGH7AAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:21.587116 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:52070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqKa4xEDsg_V3ESNZZogAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:22.893816 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:52080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqKhj0p0SRWAqcjGGH7wAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:24.223456 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:52090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqLNa6ubjKNq_cu4YWqgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:25.548655 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:52094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqLQeiSKl8TjouI-YmOgAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:27.129822 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:23:27.650965 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:41204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqL_PqhzTj3BvfDX-V3QAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:29.113575 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:41208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqMdY0UrI5A3LftIwLewAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:31.611082 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:41224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqMweiSKl8TjouI-YmPQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:33.067899 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:41234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqNdY0UrI5A3LftIwLfgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:36.738279 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:41248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqONY0UrI5A3LftIwLhAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:39.429111 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:34856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqO6BJNF7axNlVR0Um9wAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:40.948022 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:34858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqPBj0p0SRWAqcjGGH8gAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:46.151751 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:34866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqQq4xEDsg_V3ESNZZqQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:46.894131 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.128:59250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqQqBJNF7axNlVR0Um-wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:23:48.057907 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:23:49.419112 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:43374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqRXIk7brgkOH-rIWaKQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:51.965205 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:43382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqR64xEDsg_V3ESNZZqgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:53.497364 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:43386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqScU6Sx0TG1YjmQi83wAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:56.240444 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:43392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqTHIk7brgkOH-rIWaKgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:58.757462 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:36192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqTq4xEDsg_V3ESNZZrAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:00.240195 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:36198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqUBj0p0SRWAqcjGGH-gAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:02.967537 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.244.43:56608] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmqUhj0p0SRWAqcjGGH_wAAAwg"]
[Tue Mar 17 16:24:03.519400 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:36210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqUweiSKl8TjouI-YmRgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:07.613636 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.128:60808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqVxj0p0SRWAqcjGGIAgAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:24:10.133834 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:24:11.235393 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:36224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqW8U6Sx0TG1YjmQi85wAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:13.398524 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.243.128:51830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqXRj0p0SRWAqcjGGICAAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:16.599763 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:47004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqYMU6Sx0TG1YjmQi87AAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:19.440263 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:56466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqYweiSKl8TjouI-YmSwAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:21.089108 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:56478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqZda6ubjKNq_cu4YWtQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:31.034078 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33226] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:24:33.207630 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:54424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqca4xEDsg_V3ESNZZtwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:33.461874 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.228.61:57258] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmqcQeiSKl8TjouI-YmUgAAA9U"]
[Tue Mar 17 16:24:52.129949 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:24:53.216231 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:49798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqhRj0p0SRWAqcjGGIFgAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:24:58.115205 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:39262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqiqBJNF7axNlVR0UnBgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:02.284110 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:35546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqjhj0p0SRWAqcjGGIGAAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:08.882079 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:43236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqlMU6Sx0TG1YjmQi9AwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:10.755171 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:43242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqltY0UrI5A3LftIwLqgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:12.613252 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:43246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqmIh-PF_25v4hFRB5fQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:14.089098 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:43258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqmq4xEDsg_V3ESNZZwAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:14.141241 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:25:15.751014 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:43260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqmxj0p0SRWAqcjGGIHwAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:17.271634 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:58794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqnYh-PF_25v4hFRB5gAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:35.129778 2026] [proxy_fcgi:error] [pid 29151:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:25:39.338030 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.31:58806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqs64xEDsg_V3ESNZZ1AAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:41.374333 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:36262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqtXIk7brgkOH-rIWaRwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:53.007471 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:50586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqwa4xEDsg_V3ESNZZ2gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:54.444438 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:50600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqwvPqhzTj3BvfDX-WBAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:55.882257 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:50612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqw4h-PF_25v4hFRB5mAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:56.121803 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:25:58.572221 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:42788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqxta6ubjKNq_cu4YW3wAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:00.226222 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:42802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqyBj0p0SRWAqcjGGINQAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:03.091416 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:42814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqyweiSKl8TjouI-YmeQAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:17.129916 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:26:18.479566 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:35984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq2qBJNF7axNlVR0UnHgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:18.974241 2026] [core:alert] [pid 7004:tid 140411666392832] [client 74.7.243.128:35968] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user/printer.target&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user
[Tue Mar 17 16:26:19.763656 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:33382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq2_PqhzTj3BvfDX-WDQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:21.482219 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:35992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq3Rj0p0SRWAqcjGGIQAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:22.303190 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.128:33394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq3q4xEDsg_V3ESNZZ4wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:26:22.900711 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:35998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq3q4xEDsg_V3ESNZZ5AAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:25.298932 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:36010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq4Rj0p0SRWAqcjGGIRgAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:37.540987 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.31:34514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq7aBJNF7axNlVR0UnIgAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:39.133830 2026] [proxy_fcgi:error] [pid 18380:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:26:39.858926 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:34518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq73Ik7brgkOH-rIWaZAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:42.253398 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:34534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq8nIk7brgkOH-rIWaZQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:46.656376 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:34538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq9nIk7brgkOH-rIWaagAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:49.227351 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:40098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq-XIk7brgkOH-rIWaawAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:00.129786 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:27:02.346187 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:33808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrBoh-PF_25v4hFRB5pQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:04.778856 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:33818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrCNa6ubjKNq_cu4YW7gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:06.997955 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:33834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrCgeiSKl8TjouI-YmiwAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:22.134416 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:27:25.012515 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:34790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrHQeiSKl8TjouI-YmkgAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:43.045868 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:27:46.542084 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:41262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrMnIk7brgkOH-rIWaiQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:48.351427 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:56216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrNIh-PF_25v4hFRB5rgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:51.815751 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:56230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrN9a6ubjKNq_cu4YW-AAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:53.523473 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:56236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrORj0p0SRWAqcjGGIWQAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:55.861353 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:56244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrO8U6Sx0TG1YjmQi9UAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:28:04.121853 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:28:07.211513 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:54788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrRxj0p0SRWAqcjGGIXgAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:28:08.912621 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:40920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrSK4xEDsg_V3ESNZaBQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:28:25.125797 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:28:29.403518 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:40932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrXQeiSKl8TjouI-YmqAAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:28:33.374626 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:51656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrYdY0UrI5A3LftIwL4wAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:28:46.046010 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37490] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:28:56.509699 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.243.128:33410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrd8U6Sx0TG1YjmQi9dAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:03.084231 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.244.43:40586] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmrf3Ik7brgkOH-rIWapQAAAUw"]
[Tue Mar 17 16:29:08.149817 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:29:17.207410 2026] [:error] [pid 25836:tid 140411641214720] [client 74.7.241.31:51658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrjYh-PF_25v4hFRB50gAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:29:20.131006 2026] [:error] [pid 7004:tid 140411733534464] [client 74.7.241.31:48704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrkMU6Sx0TG1YjmQi9eQAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:29:20.818296 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:52318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrkNY0UrI5A3LftIwL-gAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:22.931474 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrkgeiSKl8TjouI-YmtAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:30.097889 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:29:36.435198 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.228.61:45674] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmroMU6Sx0TG1YjmQi9fwAAApQ"]
[Tue Mar 17 16:29:37.342181 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:48724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmroXIk7brgkOH-rIWatAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:37.935820 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:48724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmroXIk7brgkOH-rIWatQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:29:41.205076 2026] [core:alert] [pid 6296:tid 140411649607424] [client 74.7.243.128:55228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib
[Tue Mar 17 16:29:55.049821 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38532] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:30:19.105882 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:30:20.802880 2026] [:error] [pid 7437:tid 140411616036608] [client 216.73.216.191:15356] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrzAeiSKl8TjouI-YmwAAAA88"]
[Tue Mar 17 16:30:27.339487 2026] [:error] [pid 19507:tid 140411540502272] [client 216.73.216.191:1087] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr09Y0UrI5A3LftIwMDQAAAZg"]
[Tue Mar 17 16:30:30.815068 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:38973] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr1nIk7brgkOH-rIWayQAAAUk"]
[Tue Mar 17 16:30:35.055513 2026] [:error] [pid 29151:tid 140411733534464] [client 216.73.216.191:16207] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr2_PqhzTj3BvfDX-WdgAAAcE"]
[Tue Mar 17 16:30:41.117785 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39406] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:03.133509 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:04.220585 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:56256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr-Na6ubjKNq_cu4YXLgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:31:25.126050 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:47.117832 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:48.131913 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:57274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsJNa6ubjKNq_cu4YXRQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:32:10.121771 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:32:21.619493 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:44612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsRdY0UrI5A3LftIwMOAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:32:32.057981 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:32:47.428312 2026] [:error] [pid 6296:tid 140411632822016] [client 216.73.216.191:4967] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsX3Ik7brgkOH-rIWa_wAAAU0"]
[Tue Mar 17 16:32:55.131724 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:33:06.418624 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.243.128:43570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmscvPqhzTj3BvfDX-WzAAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:33:08.511151 2026] [:error] [pid 2473:tid 140411725141760] [client 216.73.216.191:18171] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsdKBJNF7axNlVR0UnhgAAAAI"]
[Tue Mar 17 16:33:13.885000 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:39238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmseaBJNF7axNlVR0UniQAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:33:19.045938 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:33:30.808365 2026] [:error] [pid 25836:tid 140411716749056] [client 216.73.216.191:38492] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsioh-PF_25v4hFRB6HwAAAQM"]
[Tue Mar 17 16:33:41.121763 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:33:45.432494 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:36372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsmdY0UrI5A3LftIwMVgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:34:03.128014 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:34:07.802478 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.244.43:49708] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmsrxj0p0SRWAqcjGGI7gAAAw0"]
[Tue Mar 17 16:34:11.960672 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:37844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmss_PqhzTj3BvfDX-W6AAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:14.772500 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:42584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmstgeiSKl8TjouI-Ym8wAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:34:25.131034 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:34:26.943040 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmswta6ubjKNq_cu4YXdwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:38.134233 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.228.61:57774] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmszsU6Sx0TG1YjmQi9zwAAAoY"]
[Tue Mar 17 16:34:39.792551 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:58640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsz6BJNF7axNlVR0UnpgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:42.255527 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:39414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms0vPqhzTj3BvfDX-W8gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:44.591198 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:39416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms1Bj0p0SRWAqcjGGI9gAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:46.141815 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:34:48.991720 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:33614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms2KBJNF7axNlVR0UnqAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:52.783394 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:33628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms3PPqhzTj3BvfDX-W9QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:54.111934 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:33628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms3vPqhzTj3BvfDX-W9gAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:06.567196 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:33642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms6vPqhzTj3BvfDX-XAwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:09.121846 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:35:10.027272 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:34188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms7q4xEDsg_V3ESNZangAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:16.505968 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:34202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms9HIk7brgkOH-rIWbNQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:21.458529 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:58528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms-XIk7brgkOH-rIWbOQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:24.634349 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.128:41732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms_K4xEDsg_V3ESNZapAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:35:25.577559 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:58532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms_XIk7brgkOH-rIWbOwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:32.129659 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43994] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:35:55.089802 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:36:04.956495 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:39578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtJIh-PF_25v4hFRB6UQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:08.143282 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:40588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtKK4xEDsg_V3ESNZauQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:10.358220 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.31:40588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtKK4xEDsg_V3ESNZavAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:11.669549 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:40604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtK_PqhzTj3BvfDX-XIwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:14.668339 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:40612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtLta6ubjKNq_cu4YXpwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:17.122746 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:36:17.607349 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:55310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtMdY0UrI5A3LftIwMjwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:20.783840 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:55316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtNMU6Sx0TG1YjmQi97gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:23.764596 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:55330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtN4h-PF_25v4hFRB6XAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:26.626775 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:55346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtOta6ubjKNq_cu4YXrgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:30.327529 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:48384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtPtY0UrI5A3LftIwMmgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:37.507558 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:48398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtRdY0UrI5A3LftIwMoQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:39.874718 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:55728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtR6BJNF7axNlVR0Un3AAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:40.129792 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:36:42.063525 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:55740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtStY0UrI5A3LftIwMogAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:44.996388 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:55748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtTK4xEDsg_V3ESNZaxgAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:50.488276 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:44824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtUvPqhzTj3BvfDX-XNAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:50.783047 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.128:42938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtUqBJNF7axNlVR0Un4wAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:52.370937 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:44830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtVK4xEDsg_V3ESNZazAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:55.219110 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:44844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtV9Y0UrI5A3LftIwMqgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:00.463003 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:52204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtXBj0p0SRWAqcjGGJMwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:02.146046 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45556] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:37:07.150697 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:52214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtY_PqhzTj3BvfDX-XOQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:07.967854 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:52214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtY_PqhzTj3BvfDX-XOgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:11.922901 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:35300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtZ9a6ubjKNq_cu4YXxgAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:12.339975 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:35300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtaNa6ubjKNq_cu4YXxwAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:15.900649 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:35314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtaxj0p0SRWAqcjGGJOAAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:17.570965 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:41470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtbXIk7brgkOH-rIWbbAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:25.121824 2026] [proxy_fcgi:error] [pid 18380:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:37:38.829587 2026] [core:alert] [pid 19507:tid 140411683178240] [client 216.73.216.191:47634] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 16:37:48.045929 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:37:49.086920 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.243.128:47784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtjcU6Sx0TG1YjmQi-HwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:37:54.406622 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:41486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtkta6ubjKNq_cu4YX3AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:38:11.125809 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47064] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:38:18.789961 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:44450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtqvPqhzTj3BvfDX-XWwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:38:20.572923 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.241.31:57758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtrK4xEDsg_V3ESNZa6wAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:38:22.617797 2026] [:error] [pid 2473:tid 140411590858496] [client 216.73.216.191:63596] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtrqBJNF7axNlVR0UoFwAAABI"]
[Tue Mar 17 16:38:33.530259 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:58968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtuda6ubjKNq_cu4YX_AAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:38:35.125825 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:38:57.126819 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:39:07.678751 2026] [:error] [pid 7437:tid 140411607643904] [client 216.73.216.191:36095] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt2geiSKl8TjouI-YndQAAA9A"]
[Tue Mar 17 16:39:09.343235 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.244.43:35916] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmt3dY0UrI5A3LftIwNBwAAAYk"]
[Tue Mar 17 16:39:17.710273 2026] [:error] [pid 25836:tid 140411649607424] [client 216.73.216.191:15949] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt5Yh-PF_25v4hFRB62QAAAQs"]
[Tue Mar 17 16:39:20.147364 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:39:22.675422 2026] [:error] [pid 18380:tid 140411699963648] [client 216.73.216.191:31275] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt6q4xEDsg_V3ESNZbEwAAAgU"]
[Tue Mar 17 16:39:28.557353 2026] [:error] [pid 2598:tid 140411582465792] [client 216.73.216.191:35735] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt8Bj0p0SRWAqcjGGJZQAAAxM"]
[Tue Mar 17 16:39:32.165016 2026] [:error] [pid 6296:tid 140411691570944] [client 216.73.216.191:59871] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt9HIk7brgkOH-rIWbwAAAAUY"]
[Tue Mar 17 16:39:35.608936 2026] [:error] [pid 19507:tid 140411658000128] [client 216.73.216.191:26507] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt99Y0UrI5A3LftIwNFwAAAYo"]
[Tue Mar 17 16:39:39.589036 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:57770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt-3Ik7brgkOH-rIWbxgAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:39:40.100001 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.228.61:46756] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmt_Bj0p0SRWAqcjGGJaQAAAwA"]
[Tue Mar 17 16:39:43.050028 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:39:56.490359 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:46114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuDAeiSKl8TjouI-YniAAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:39:59.641837 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:47464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuD6BJNF7axNlVR0UoRAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:01.439273 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:47470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuEcU6Sx0TG1YjmQi-UwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:04.647683 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:47482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuFKBJNF7axNlVR0UoRwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:06.126067 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:40:06.135538 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:47486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuFvPqhzTj3BvfDX-XpwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:06.438213 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:42042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuFtY0UrI5A3LftIwNLAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:40:08.093985 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:51328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuGHIk7brgkOH-rIWb2AAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:11.720926 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:51340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuG64xEDsg_V3ESNZbIQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:18.075691 2026] [:error] [pid 7437:tid 140411616036608] [client 216.73.216.191:34680] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuIgeiSKl8TjouI-YnlgAAA88"]
[Tue Mar 17 16:40:28.038466 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:40:32.371736 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:45842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuMHIk7brgkOH-rIWb4wAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:52.130606 2026] [proxy_fcgi:error] [pid 18380:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:40:56.454909 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.243.128:48664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuSIh-PF_25v4hFRB7AgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:40:57.428953 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:42322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuScU6Sx0TG1YjmQi-YQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:03.055347 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:42328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuT3Ik7brgkOH-rIWb6AAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:09.091139 2026] [:error] [pid 29151:tid 140411574073088] [client 216.73.216.191:38412] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuVfPqhzTj3BvfDX-XtAAAAdQ"]
[Tue Mar 17 16:41:15.125818 2026] [proxy_fcgi:error] [pid 7437:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:41:18.913588 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:59238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuXvPqhzTj3BvfDX-XtwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:21.723403 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:59250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuYaBJNF7axNlVR0UoYAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:24.791737 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:59252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuZBj0p0SRWAqcjGGJhgAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:25.348448 2026] [:error] [pid 18380:tid 140411632822016] [client 216.73.216.191:30319] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuZa4xEDsg_V3ESNZbOQAAAg0"]
[Tue Mar 17 16:41:36.964209 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:36794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmucIh-PF_25v4hFRB7CwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:38.129777 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:41:39.155457 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmucweiSKl8TjouI-YnrgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:41.344245 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:48728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmudPPqhzTj3BvfDX-XvwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:43.617386 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:48734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmud64xEDsg_V3ESNZbPwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:46.040743 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:48742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuetY0UrI5A3LftIwNSQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:46.553696 2026] [:error] [pid 29151:tid 140411649607424] [client 216.73.216.191:41639] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuevPqhzTj3BvfDX-XwgAAAcs"]
[Tue Mar 17 16:41:47.802236 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:56368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmue3Ik7brgkOH-rIWb9wAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:49.209019 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:56384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmufda6ubjKNq_cu4YYMwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:52.020258 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:56396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmugKBJNF7axNlVR0UoawAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:54.244423 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:56398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmugtY0UrI5A3LftIwNTQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:56.550591 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:56400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuhHIk7brgkOH-rIWb_AAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:58.254620 2026] [:error] [pid 2598:tid 140411699963648] [client 216.73.216.191:6649] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuhhj0p0SRWAqcjGGJlAAAAwU"]
[Tue Mar 17 16:41:58.679454 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:51614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuhtY0UrI5A3LftIwNUAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:00.129887 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:42:01.473685 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:51630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuida6ubjKNq_cu4YYNwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:03.398011 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:51634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuiq4xEDsg_V3ESNZbRgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:04.740112 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:51640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmujAeiSKl8TjouI-YntQAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:06.019300 2026] [:error] [pid 7437:tid 140411607643904] [client 216.73.216.191:16218] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmujgeiSKl8TjouI-YnuAAAA9A"]
[Tue Mar 17 16:42:06.131463 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:51642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmujsU6Sx0TG1YjmQi-dgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:08.872568 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:41942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuj9Y0UrI5A3LftIwNUgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:10.178503 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:41956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuknIk7brgkOH-rIWb_gAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:11.597982 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:41958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuk8U6Sx0TG1YjmQi-eAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:13.879912 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:41966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmulRj0p0SRWAqcjGGJmAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:16.060120 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:41976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmumHIk7brgkOH-rIWcAAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:18.517920 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:43236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmumYh-PF_25v4hFRB7KAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:20.635422 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:43238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmunHIk7brgkOH-rIWcBQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:22.110886 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:43242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmunoh-PF_25v4hFRB7LgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:22.311047 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:43242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmunoh-PF_25v4hFRB7LwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:23.125760 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:42:23.709210 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:43244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmun_PqhzTj3BvfDX-XywAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:25.630148 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.243.128:51660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuoYh-PF_25v4hFRB7MwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:26.027769 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:43260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuotY0UrI5A3LftIwNXwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:27.380638 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:59238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuo9Y0UrI5A3LftIwNYAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:29.039333 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:59254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmupda6ubjKNq_cu4YYQgAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:32.115604 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:59256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuqMU6Sx0TG1YjmQi-gQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:37.314038 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:59270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmurcU6Sx0TG1YjmQi-hAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:40.044776 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:49392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmusNY0UrI5A3LftIwNZQAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:41.565383 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:49404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmusdY0UrI5A3LftIwNaQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:41.762813 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:49404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmusdY0UrI5A3LftIwNagAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:42.340195 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:49404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmustY0UrI5A3LftIwNawAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:44.385687 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.241.31:49418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmutK4xEDsg_V3ESNZbXAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:45.133780 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:42:45.972942 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:49430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmutcU6Sx0TG1YjmQi-hgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:47.342052 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:49998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmutweiSKl8TjouI-YnyQAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:52.896678 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:50010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuvNY0UrI5A3LftIwNbwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:54.668340 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:50014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuvq4xEDsg_V3ESNZbZgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:55.991251 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:50024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuv9a6ubjKNq_cu4YYUgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:57.389849 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuwYh-PF_25v4hFRB7OwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:58.842672 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:48726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuwoh-PF_25v4hFRB7PAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:00.866265 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:48740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuxNY0UrI5A3LftIwNdQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:02.347201 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:48750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuxta6ubjKNq_cu4YYWAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:04.632353 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:48766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuyNa6ubjKNq_cu4YYXAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:06.794218 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:48776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuynIk7brgkOH-rIWcDwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:08.117830 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:43:08.272419 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:47660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuzPPqhzTj3BvfDX-X1wAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:09.568216 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:47672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuza4xEDsg_V3ESNZbdAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:12.091159 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:47674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu0Na6ubjKNq_cu4YYZwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:13.749796 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:47690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu0Rj0p0SRWAqcjGGJsQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:15.075225 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:47694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu04h-PF_25v4hFRB7QAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:17.349259 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:52658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu1a4xEDsg_V3ESNZbfAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:18.821034 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu1tY0UrI5A3LftIwNegAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:20.305119 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:52662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu2Na6ubjKNq_cu4YYcQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:21.345010 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.128:53738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu2a4xEDsg_V3ESNZbgAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:43:23.342721 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:52666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu24h-PF_25v4hFRB7QgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:24.633762 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:52668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu3PPqhzTj3BvfDX-X3QAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:25.947436 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:52680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu3a4xEDsg_V3ESNZbgwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:27.220712 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:52692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu364xEDsg_V3ESNZbhgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:28.481581 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:46580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4MU6Sx0TG1YjmQi-jwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:29.822056 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:46594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4Yh-PF_25v4hFRB7QwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:29.983163 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.243.128:48998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4cU6Sx0TG1YjmQi-kAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:43:31.097930 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:46596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4weiSKl8TjouI-Yn0QAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:32.123389 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:43:32.426080 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:46598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu5Bj0p0SRWAqcjGGJuAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:33.695186 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:46610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu5fPqhzTj3BvfDX-X4AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:35.011251 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:46622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu5xj0p0SRWAqcjGGJuQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:36.311136 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:46638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu6MU6Sx0TG1YjmQi-kgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:40.514083 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:54960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu7AeiSKl8TjouI-Yn1QAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:43.124529 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:54974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu764xEDsg_V3ESNZbjAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:44.837281 2026] [core:alert] [pid 7004:tid 140411607643904] [client 74.7.241.31:54986] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt/lc
[Tue Mar 17 16:43:55.625847 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:43:55.746780 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:35256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu-xj0p0SRWAqcjGGJwQAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:44:05.669405 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.243.128:44944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvBXIk7brgkOH-rIWcMQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:44:06.349309 2026] [:error] [pid 19507:tid 140411548894976] [client 216.73.216.191:29048] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvBtY0UrI5A3LftIwNjAAAAZc"]
[Tue Mar 17 16:44:14.392372 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.128:41374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvDgeiSKl8TjouI-Yn5gAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:44:20.133828 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:44:42.062954 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:45:02.230379 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:40540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvPvPqhzTj3BvfDX-YGQAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:45:04.142064 2026] [proxy_fcgi:error] [pid 7004:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56278] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:45:26.077898 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:45:58.122027 2026] [proxy_fcgi:error] [pid 7004:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:46:10.232238 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:32810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvgsU6Sx0TG1YjmQi-0wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:46:24.137568 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:46:43.701564 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:53306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvo4h-PF_25v4hFRB7sQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:46:48.129792 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:46:50.031212 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.243.128:43996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvqoh-PF_25v4hFRB7twAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:47:10.131905 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:47:31.133874 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:47:53.129661 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:48:15.130015 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:48:37.049881 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:48:58.045824 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:49:19.121854 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:49:23.741357 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:49210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwQ64xEDsg_V3ESNZcZQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:49:27.245847 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:36426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwR_PqhzTj3BvfDX-YfAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:49:41.389823 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33862] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:49:43.417168 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:36456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwV8U6Sx0TG1YjmQi_WAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:49:45.829593 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.243.128:51582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwWcU6Sx0TG1YjmQi_XgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:49:52.745041 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.128:38946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwYKBJNF7axNlVR0UpLAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:03.142139 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:50:07.463434 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:57620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwb8U6Sx0TG1YjmQi_cgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:50:24.121777 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:50:26.092958 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:33656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwgnIk7brgkOH-rIWc8QAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:28.551296 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:53008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwhMU6Sx0TG1YjmQi_dwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:31.739999 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:53018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwh6BJNF7axNlVR0UpQwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:33.952115 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:53022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwicU6Sx0TG1YjmQi_egAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:34.208339 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:53022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwisU6Sx0TG1YjmQi_ewAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:37.118804 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:53026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwjRj0p0SRWAqcjGGKVAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:37.288612 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:53026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwjRj0p0SRWAqcjGGKVQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:39.319551 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:53612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwj9a6ubjKNq_cu4YZQAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:45.109835 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:50:46.524113 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:53618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwlqBJNF7axNlVR0UpTgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:50.311098 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:39676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwmq4xEDsg_V3ESNZchAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:55.991499 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:39686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwnxj0p0SRWAqcjGGKXQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:58.484815 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:36410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwonIk7brgkOH-rIWc_wAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:00.662873 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:36418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwpIh-PF_25v4hFRB8IgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:03.641801 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:36426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwpxj0p0SRWAqcjGGKYwAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:09.133798 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:51:11.290726 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:47172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwr3Ik7brgkOH-rIWdBwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:15.096493 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:47184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwshj0p0SRWAqcjGGKbAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:16.218544 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.128:38946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwtKBJNF7axNlVR0UpYAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:17.786406 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:58228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwtcU6Sx0TG1YjmQi_uQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:51:18.039517 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:47190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwtnIk7brgkOH-rIWdDQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:19.386810 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:42220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwt_PqhzTj3BvfDX-YsAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:20.285574 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.243.128:58242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwuPPqhzTj3BvfDX-YtAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:20.942011 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:42228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwuK4xEDsg_V3ESNZcjgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:21.614959 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.243.128:37886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwua4xEDsg_V3ESNZcjwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:51:23.071504 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:42234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwu8U6Sx0TG1YjmQi_2AAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:25.337141 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:42238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwvRj0p0SRWAqcjGGKcAAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:32.140049 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:51:33.567216 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:55078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwxXIk7brgkOH-rIWdDwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:36.499576 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:55094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwyNa6ubjKNq_cu4YZVgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:37.991391 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:36186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwya4xEDsg_V3ESNZclgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:39.473133 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:36200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwy9Y0UrI5A3LftIwOWAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:40.811910 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:36204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwzK4xEDsg_V3ESNZcmQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:42.173236 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:36216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwztY0UrI5A3LftIwOWwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:43.528232 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:36224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwz_PqhzTj3BvfDX-YuQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:45.212177 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:36232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw0Rj0p0SRWAqcjGGKeAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:47.015053 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:36240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw09Y0UrI5A3LftIwOYQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:48.497644 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:53344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw1HIk7brgkOH-rIWdGAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:50.686175 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:53356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw1vPqhzTj3BvfDX-YuwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:53.719974 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:53362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw2aBJNF7axNlVR0UpZwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:53.935086 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:53362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw2aBJNF7axNlVR0UpaAAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:55.166052 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:51:56.734746 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:53366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw3HIk7brgkOH-rIWdHQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:00.456995 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:45120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw4AeiSKl8TjouI-YpDAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:04.598223 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:45128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw5AeiSKl8TjouI-YpDQAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:07.558829 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:36206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw564xEDsg_V3ESNZcqgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:10.366520 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.241.31:36206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw6q4xEDsg_V3ESNZcsgAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:18.125807 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:52:19.522681 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw86BJNF7axNlVR0UpbQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:19.722637 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw86BJNF7axNlVR0UpbwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:23.150983 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw96BJNF7axNlVR0UpcgAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:23.734960 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw96BJNF7axNlVR0UpcwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:25.043899 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:41450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw-da6ubjKNq_cu4YZYwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:27.267681 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:52080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw-_PqhzTj3BvfDX-YxgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:29.482327 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:52094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw_da6ubjKNq_cu4YZaQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:31.638863 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:52100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw_xj0p0SRWAqcjGGKhAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:40.126134 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:52:45.479740 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:52106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxDaBJNF7axNlVR0UpfQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:48.323441 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:55958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxEK4xEDsg_V3ESNZcuwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:52.256397 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:55968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxFPPqhzTj3BvfDX-Y1gAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:53:02.177818 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:53:05.518869 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:37890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxIYh-PF_25v4hFRB8XwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:53:06.699394 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:55974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxItY0UrI5A3LftIwOjQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:53:14.686046 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:50810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxKnIk7brgkOH-rIWdSAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:53:25.326351 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:53:47.029848 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39756] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:54:10.125972 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:54:11.188787 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:50826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxY3Ik7brgkOH-rIWdiwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:54:13.411075 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.244.43:51702] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmxZQeiSKl8TjouI-YpLQAAA9M"]
[Tue Mar 17 16:54:32.123203 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:54:41.663323 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.243.128:46378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxgXIk7brgkOH-rIWdpwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:54:43.064998 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.228.61:37016] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmxg3Ik7brgkOH-rIWdqwAAAUc"]
[Tue Mar 17 16:54:46.090469 2026] [mime_magic:error] [pid 29151:tid 140411649607424] (70014)End of file found: [client 74.7.243.128:40736] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Tue Mar 17 16:54:54.841826 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:55:06.623506 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:50826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxmnIk7brgkOH-rIWdyAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:55:16.129782 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:55:18.338727 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:60418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxpgeiSKl8TjouI-YpTAAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:20.121881 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:33776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxqNa6ubjKNq_cu4YZngAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:23.093792 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:33788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxq6BJNF7axNlVR0Up4QAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:26.046739 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:33796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxrsU6Sx0TG1YjmQjAJwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:29.041976 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:38370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxsRj0p0SRWAqcjGGKzwAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:32.900758 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:38378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxtHIk7brgkOH-rIWd2QAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:35.816671 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.31:38382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxt64xEDsg_V3ESNZc7wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:38.783271 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:47702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxuq4xEDsg_V3ESNZc9AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:39.129790 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43226] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:55:42.287411 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.31:47712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxvq4xEDsg_V3ESNZc-gAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:48.233523 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:45254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxxMU6Sx0TG1YjmQjANQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:50.368033 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:45262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxxgeiSKl8TjouI-YpXgAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:53.265540 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:45274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxyYh-PF_25v4hFRB8lAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:56.344853 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.241.31:45282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxzK4xEDsg_V3ESNZc_QAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:59.334041 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:48372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxz9a6ubjKNq_cu4YZsAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:00.317365 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:48372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx0Na6ubjKNq_cu4YZsQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:02.162369 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:56:03.327027 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:48386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx08U6Sx0TG1YjmQjAPwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:04.778965 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:48392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx1AeiSKl8TjouI-YpYwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:07.739174 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx19a6ubjKNq_cu4YZtQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:10.650442 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:48708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx2qBJNF7axNlVR0UqCAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:12.661593 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx3Bj0p0SRWAqcjGGK3gAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:14.151297 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:48728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx3vPqhzTj3BvfDX-ZKQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:15.747691 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:48734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx39a6ubjKNq_cu4YZtwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:18.646691 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:55882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx4qBJNF7axNlVR0UqEQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:21.725153 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:55892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx5QeiSKl8TjouI-YpagAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:25.141815 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44514] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:56:26.227508 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:55896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx6qBJNF7axNlVR0UqFgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:29.834459 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:53220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx7Rj0p0SRWAqcjGGK6gAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:32.907383 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:53232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx8PPqhzTj3BvfDX-ZLwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:36.423997 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.243.128:60342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx9HIk7brgkOH-rIWeAQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:56:36.762238 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:53244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx9Na6ubjKNq_cu4YZvQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:39.098724 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:59674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx9weiSKl8TjouI-YpcQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:40.919476 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:59680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx-K4xEDsg_V3ESNZdDAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:42.546494 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:59694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx-qBJNF7axNlVR0UqIAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:44.680744 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:59702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx_K4xEDsg_V3ESNZdEAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:46.181512 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:59714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx_ta6ubjKNq_cu4YZwQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:48.141766 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:56:48.903035 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:51526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyAIh-PF_25v4hFRB8qQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:52.287930 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:51532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyBPPqhzTj3BvfDX-ZNwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:57.680310 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:51602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyCda6ubjKNq_cu4YZzQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:02.414543 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:52014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyDhj0p0SRWAqcjGGLBQAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:57:03.426378 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:51604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyD_PqhzTj3BvfDX-ZPQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:09.670343 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.243.128:40706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyFYh-PF_25v4hFRB8vAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:57:10.123991 2026] [proxy_fcgi:error] [pid 18380:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:57:10.387014 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:41780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyFgeiSKl8TjouI-YpfQAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:13.599628 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:41796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyGa4xEDsg_V3ESNZdJAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:19.981997 2026] [core:alert] [pid 19507:tid 140411674785536] [client 74.7.241.31:58532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:20.575030 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:58534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyIMU6Sx0TG1YjmQjAXwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:23.880609 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:58550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyI9a6ubjKNq_cu4YZ3gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:28.331092 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.243.128:35042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyKMU6Sx0TG1YjmQjAZgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:30.241818 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.128:36980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyKQeiSKl8TjouI-YphQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:57:30.459659 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.128:36980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyKgeiSKl8TjouI-YphwAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:57:34.146370 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:57:34.467707 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:38696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyLnIk7brgkOH-rIWeGQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:44.932886 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:41480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyOHIk7brgkOH-rIWeHQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:55.319616 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:40318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyQweiSKl8TjouI-YpjAAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:56.085881 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:57:57.105887 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.128:36996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyRRj0p0SRWAqcjGGLIwAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:58:01.884843 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.128:38810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmySa4xEDsg_V3ESNZdOgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:06.044670 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:52000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyTta6ubjKNq_cu4YZ6AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:16.039785 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:54926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyWAeiSKl8TjouI-YpkgAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:19.133802 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47404] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:58:26.347790 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:50246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyYgeiSKl8TjouI-YplgAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:37.180686 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:39606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmybMU6Sx0TG1YjmQjAewAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:41.158081 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:58:46.759098 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:57734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmydnIk7brgkOH-rIWeOAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:57.479382 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:58548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmygXIk7brgkOH-rIWePwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:05.130110 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:59:07.670256 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:40362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyi_PqhzTj3BvfDX-ZgwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:15.594521 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.244.43:45200] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmyk6BJNF7axNlVR0UqhwAAABU"]
[Tue Mar 17 16:59:27.125855 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:59:29.015506 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:53396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyoXIk7brgkOH-rIWeTgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:32.806489 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.243.128:38816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmypPPqhzTj3BvfDX-ZkgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:39.414001 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:48720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyqtY0UrI5A3LftIwPNAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:47.250934 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:37520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmysxj0p0SRWAqcjGGLRQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:52.339446 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.228.61:38962] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmyuIh-PF_25v4hFRB9HAAAAQA"]
[Tue Mar 17 16:59:55.148529 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:59:56.792207 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:37526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyvIh-PF_25v4hFRB9HwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:06.234260 2026] [mime_magic:error] [pid 25836:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:60763] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 17:00:08.606417 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.128:43226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyyAeiSKl8TjouI-YpzwAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:11.561122 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.243.128:42050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyy8U6Sx0TG1YjmQjAqQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:00:15.668212 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:60490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyz8U6Sx0TG1YjmQjAqgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:17.354136 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:00:24.240277 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:40102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmy2MU6Sx0TG1YjmQjArQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:27.670661 2026] [mime_magic:error] [pid 2598:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:42054] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware/meson
[Tue Mar 17 17:00:27.670902 2026] [access_compat:error] [pid 2598:tid 140411574073088] [client 74.7.243.128:42054] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware/meson
[Tue Mar 17 17:00:32.990804 2026] [core:alert] [pid 25836:tid 140411540502272] [client 74.7.241.31:53924] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:40.125801 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:01:03.091955 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:01:06.423268 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:47966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzARj0p0SRWAqcjGGLggAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:01:24.093838 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:01:27.664060 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:54874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzF_PqhzTj3BvfDX-Z2wAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:01:47.125810 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:02:05.219560 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.243.128:42054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzPRj0p0SRWAqcjGGLvAAAAwE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:02:10.085473 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53800] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:02:12.471711 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:49188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzRAeiSKl8TjouI-YqEAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:02:22.092904 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:49010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzTgeiSKl8TjouI-YqFQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:02:32.117773 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54442] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:02:33.575112 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:54196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzWXIk7brgkOH-rIWetQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:02:34.559830 2026] [mime_magic:error] [pid 18380:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:25030] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 17:02:47.641995 2026] [core:alert] [pid 7437:tid 140411565680384] [client 74.7.243.128:49010] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/kbd/consolefonts
[Tue Mar 17 17:02:54.129797 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:03:16.127551 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:03:29.332202 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.243.128:51350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzkRj0p0SRWAqcjGGL-AAAAxQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:03:30.936670 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.243.128:51350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzkhj0p0SRWAqcjGGL-gAAAwA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:03:37.285772 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56030] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:03:47.074239 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:54176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzo_PqhzTj3BvfDX-aJQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:03:50.462476 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:34522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzpoh-PF_25v4hFRB9gQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:04:02.147656 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:04:05.403251 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:53422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmztXIk7brgkOH-rIWfFAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:04:13.250842 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.243.128:33342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzvcU6Sx0TG1YjmQjBJAAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:04:17.149108 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.43:43964] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmzwaBJNF7axNlVR0UrJQAAAAY"]
[Tue Mar 17 17:04:19.823016 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:34392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzw9Y0UrI5A3LftIwP4QAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:04:25.333794 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57540] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:04:48.099267 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:04:48.827378 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.241.31:57828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmz4MU6Sx0TG1YjmQjBMwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:04:53.125818 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.228.61:46676] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmz5XIk7brgkOH-rIWfMgAAAUY"]
[Tue Mar 17 17:05:15.153805 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:05:17.737033 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:49494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmz_da6ubjKNq_cu4Ya1AAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:05:37.129768 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:01.124520 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:04.550953 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:37426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0LAeiSKl8TjouI-YqxAAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:06:15.181222 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:35934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0Nxj0p0SRWAqcjGGMTQAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:06:24.137785 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:26.863144 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:47074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0QnIk7brgkOH-rIWfewAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:06:33.435194 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:42518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0SaBJNF7axNlVR0UrdQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:06:46.125829 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34490] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:52.446493 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:46592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0XMU6Sx0TG1YjmQjBjgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:07:08.061950 2026] [proxy_fcgi:error] [pid 7437:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:07:31.137783 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:07:44.195237 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:49956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0j_PqhzTj3BvfDX-amwAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:07:53.125809 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:08:16.129813 2026] [proxy_fcgi:error] [pid 25836:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37960] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:08:26.679085 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:45882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0uvPqhzTj3BvfDX-axAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:08:37.119252 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:08:41.831360 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:37854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0yXIk7brgkOH-rIWfugAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:08:47.208711 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:45628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0z4h-PF_25v4hFRB-EQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:08:50.395751 2026] [:error] [pid 32125:tid 140411658000128] [client 74.7.241.31:42712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm00jv_Uz7NvOGZZdL6aQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:08:58.129882 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39942] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:09:11.470025 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.243.128:42218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm05xj0p0SRWAqcjGGMzAAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:18.380204 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.244.43:44816] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm07ta6ubjKNq_cu4YbhAAAA1E"]
[Tue Mar 17 17:09:21.137814 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40828] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:09:37.256937 2026] [mime_magic:error] [pid 2598:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:39826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run
[Tue Mar 17 17:09:37.257193 2026] [access_compat:error] [pid 2598:tid 140411557287680] [client 74.7.243.128:39826] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run
[Tue Mar 17 17:09:38.967826 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.243.128:46758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Aoh-PF_25v4hFRB-GwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:44.136462 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:09:48.769351 2026] [:error] [pid 32637:tid 140411683178240] [client 74.7.241.31:42728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1DOb2RVWFKPpFAR6FUQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:09:53.707204 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:45914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1EQeiSKl8TjouI-YrFgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:54.169387 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.228.61:51214] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm1EuyqAr6etmhZHNo6EgAAAFA"]
[Tue Mar 17 17:09:54.511820 2026] [:error] [pid 32444:tid 140411616036608] [client 74.7.243.128:46250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1EmhA41DpGx8pNLQ1WAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:57.087539 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:45916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Fa4xEDsg_V3ESNZehwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:10:06.105381 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:48836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1HuyqAr6etmhZHNo6IAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:10:07.121787 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:10:09.663410 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:60538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Ida6ubjKNq_cu4YbjAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:10:29.129766 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:10:39.702644 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:60542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1P-yqAr6etmhZHNo6OgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:10:41.797494 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:60542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1QOyqAr6etmhZHNo6PAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:10:45.188148 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:50986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Q9a6ubjKNq_cu4YbmQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:10:54.121804 2026] [proxy_fcgi:error] [pid 7437:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:10:57.384460 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:50986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Uda6ubjKNq_cu4YbpQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:11:01.997444 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:49306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1VdY0UrI5A3LftIwQwQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:11:06.672235 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:49322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Whj0p0SRWAqcjGGM8wAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:11:16.130070 2026] [proxy_fcgi:error] [pid 25836:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:11:21.721092 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:54766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1adY0UrI5A3LftIwQ1wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:11:26.929061 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:51034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1bnIk7brgkOH-rIWf6wAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:11:39.139386 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:11:56.507740 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:53308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1jOyqAr6etmhZHNo6XAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:11:58.408809 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:33172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1jvPqhzTj3BvfDX-a_QAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:12:00.121801 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:12:16.325801 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:33176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1oPPqhzTj3BvfDX-bDwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:12:19.623147 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:41350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1o3Ik7brgkOH-rIWf9AAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:12:29.101946 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46910] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:12:52.127774 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:13:15.069907 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:13:43.069848 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:05.139686 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:26.117784 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:28.362781 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.244.43:52178] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm2JHIk7brgkOH-rIWgEQAAAUY"]
[Tue Mar 17 17:14:47.133783 2026] [proxy_fcgi:error] [pid 7004:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52442] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:54.598129 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.228.61:52334] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm2PtY0UrI5A3LftIwRDAAAAZE"]
[Tue Mar 17 17:14:56.522502 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:60412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2QNY0UrI5A3LftIwRDwAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:14:58.309047 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:60424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2QvPqhzTj3BvfDX-bKgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:15:00.926582 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:49148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2RHIk7brgkOH-rIWgFwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:04.682115 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.243.128:49162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2SBj0p0SRWAqcjGGNUgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:06.694416 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:41352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2Shj0p0SRWAqcjGGNVQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:15:09.061801 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:15:10.864942 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:49178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2TuyqAr6etmhZHNo6lgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:16.123426 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:54670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2VMU6Sx0TG1YjmQjCIgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:31.141892 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:15:52.049871 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:16:14.125817 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:16:36.121782 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:16:58.037808 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:17:20.131059 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:17:21.207110 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.243.128:33934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm20Rj0p0SRWAqcjGGNegAAAwU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Tue Mar 17 17:17:24.927012 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:49758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm21PPqhzTj3BvfDX-bVwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:17:29.249970 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:46682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm22Rj0p0SRWAqcjGGNgAAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:17:42.131296 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:17:46.779655 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:60152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm26qBJNF7axNlVR0UsjQAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:18:04.137778 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57344] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:18:26.126515 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:18:37.198639 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:37138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3HQeiSKl8TjouI-YrmAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:18:48.128013 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58122] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:10.129803 2026] [proxy_fcgi:error] [pid 29151:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:14.763530 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.243.128:59856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3Qhj0p0SRWAqcjGGNpQAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:19:32.098050 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:35.487014 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.244.43:56924] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm3V_PqhzTj3BvfDX-bhgAAAc0"]
[Tue Mar 17 17:19:55.149800 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:57.889218 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.228.61:34198] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm3baBJNF7axNlVR0UsqQAAAAw"]
[Tue Mar 17 17:20:00.798595 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:52056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3cOyqAr6etmhZHNo68QAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:20:03.129140 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.243.128:40706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3c_PqhzTj3BvfDX-bjAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:20:06.186257 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.243.128:40716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3dnIk7brgkOH-rIWgZgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:20:17.033824 2026] [proxy_fcgi:error] [pid 25836:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:20:39.117820 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:20:48.491403 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:34764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3oAeiSKl8TjouI-Yr2wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:21:15.139313 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:21:43.137801 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:21:45.370340 2026] [core:alert] [pid 6296:tid 140411540502272] [client 74.7.243.128:40718] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/include
[Tue Mar 17 17:22:06.137905 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32814] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:22:28.089810 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:22:51.125790 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:23:13.127099 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:23:15.391852 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:50158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4M4h-PF_25v4hFRB-tgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:18.695226 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:59508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4NsU6Sx0TG1YjmQjCdAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:23:20.285102 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:59512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4OIh-PF_25v4hFRB-vAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:21.267491 2026] [access_compat:error] [pid 2473:tid 140411733534464] [client 216.73.216.191:60808] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 17:23:21.563170 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:59528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4OQeiSKl8TjouI-YsAwAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:33.958111 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.243.128:57676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4RYh-PF_25v4hFRB-ygAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:35.118013 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:23:56.131458 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:24:18.125893 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:24:34.854570 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.244.43:39054] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm4ggeiSKl8TjouI-YsCwAAA8A"]
[Tue Mar 17 17:24:41.455369 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:24:57.864522 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.228.61:59968] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm4mda6ubjKNq_cu4YcOgAAA1Y"]
[Tue Mar 17 17:25:04.141815 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:25:25.122020 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:25:47.121795 2026] [proxy_fcgi:error] [pid 25836:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:26:09.033803 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:26:38.037545 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:27:00.069878 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:27:01.200230 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:59540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5FXIk7brgkOH-rIWg6gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:27:29.021822 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:27:44.198483 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:45712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5P9Y0UrI5A3LftIwRsQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:27:51.128218 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:28:15.125913 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:28:20.087385 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:37856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5ZKBJNF7axNlVR0UtDwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:28:21.548288 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:56802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5Zda6ubjKNq_cu4YcVwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:28:24.255674 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:56804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5aAeiSKl8TjouI-YsNgAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:25.983325 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:56806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5aQeiSKl8TjouI-YsNwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:28.895939 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:57934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5bMU6Sx0TG1YjmQjCvAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:29.355830 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.243.128:56440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5bYh-PF_25v4hFRB_JwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:28:34.687554 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5cgeiSKl8TjouI-YsPgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:37.127548 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:28:39.165182 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:57956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5d9a6ubjKNq_cu4YcYAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:28:59.129810 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:29:18.929955 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.243.128:60812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5nhj0p0SRWAqcjGGOIAAAAwo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:29:21.110102 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:29:31.661060 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:60812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5qxj0p0SRWAqcjGGOJAAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:29:43.131150 2026] [proxy_fcgi:error] [pid 7004:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:29:46.340426 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.43:35926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm5uqBJNF7axNlVR0UtIAAAAAU"]
[Tue Mar 17 17:29:57.371505 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:45262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5xcU6Sx0TG1YjmQjC2wAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:29:57.868914 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.228.61:57642] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm5xaBJNF7axNlVR0UtJwAAABc"]
[Tue Mar 17 17:29:59.053994 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:34822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5x8U6Sx0TG1YjmQjC3AAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:30:05.045880 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:30:05.269998 2026] [core:alert] [pid 2598:tid 140411590858496] [client 74.7.241.31:34826] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root
[Tue Mar 17 17:30:27.139376 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38588] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:30:49.131483 2026] [proxy_fcgi:error] [pid 7437:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38758] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:31:11.129863 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:31:33.045923 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39120] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:31:59.057820 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:32:23.129775 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39540] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:32:52.121280 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:33:13.125837 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39994] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:33:18.124037 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:34842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6jnIk7brgkOH-rIWhQwAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:33:38.129836 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:00.133767 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:22.124813 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:23.236314 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:53606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6z_PqhzTj3BvfDX-cQgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:34:25.802298 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:40486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm60XIk7brgkOH-rIWhUQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:34:43.125324 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:45.329117 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.244.43:42712] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm65XIk7brgkOH-rIWhVQAAAUs"]
[Tue Mar 17 17:34:52.839764 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:54336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm67PPqhzTj3BvfDX-cTgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:34:58.361628 2026] [mime_magic:error] [pid 2473:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:60988] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr
[Tue Mar 17 17:34:58.440068 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.228.61:60174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm68qBJNF7axNlVR0UtZgAAABA"]
[Tue Mar 17 17:35:02.917228 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:32772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm69qBJNF7axNlVR0UtbQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:35:06.141776 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:35:06.227936 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:32774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6-hj0p0SRWAqcjGGOlQAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:35:10.350658 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:34278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6_qBJNF7axNlVR0UtcwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:35:28.126445 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:35:50.129779 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:35:51.438818 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:34284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Jxj0p0SRWAqcjGGOuwAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:35:54.831841 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:34284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Khj0p0SRWAqcjGGOwQAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:36:11.118199 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:36:20.774729 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:39610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7RPPqhzTj3BvfDX-cZQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:36:34.129786 2026] [proxy_fcgi:error] [pid 25836:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:36:38.435616 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:34416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Vta6ubjKNq_cu4YcsQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:36:38.643141 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:34416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Vta6ubjKNq_cu4YcsgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:36:56.129800 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:37:22.125793 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:37:45.125865 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:38:15.125828 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43394] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:38:17.506477 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.128:45966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7uKBJNF7axNlVR0UtmgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:38:46.121800 2026] [proxy_fcgi:error] [pid 25836:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:08.133783 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:30.033992 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:52.025810 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:53.607940 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.244.43:48956] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm8GXIk7brgkOH-rIWhtQAAAUU"]
[Tue Mar 17 17:39:59.027137 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.228.61:52952] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm8H_PqhzTj3BvfDX-cjAAAAcc"]
[Tue Mar 17 17:40:05.922799 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8JXIk7brgkOH-rIWhvAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:40:14.121802 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:40:36.118390 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:40:58.121782 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:41:20.129868 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:41:41.091374 2026] [:error] [pid 31803:tid 140411574073088] [client 216.73.216.191:35663] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8heyqAr6etmhZHNo8QgAAAFQ"]
[Tue Mar 17 17:41:41.969344 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8hXIk7brgkOH-rIWh4gAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:41:42.126829 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:41:44.230792 2026] [:error] [pid 2598:tid 140411548894976] [client 216.73.216.191:14041] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8hxj0p0SRWAqcjGGPTAAAAxc"]
[Tue Mar 17 17:41:44.231683 2026] [:error] [pid 19507:tid 140411557287680] [client 216.73.216.191:14797] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8h9Y0UrI5A3LftIwSnwAAAZY"]
[Tue Mar 17 17:41:45.198333 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:34186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8ieyqAr6etmhZHNo8RgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:41:46.905306 2026] [:error] [pid 2473:tid 140411540502272] [client 216.73.216.191:28490] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8iqBJNF7axNlVR0UtyAAAABg"]
[Tue Mar 17 17:42:00.932294 2026] [:error] [pid 2473:tid 140411733534464] [client 216.73.216.191:29734] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8mKBJNF7axNlVR0Ut0QAAAAE"]
[Tue Mar 17 17:42:01.503036 2026] [:error] [pid 19507:tid 140411649607424] [client 216.73.216.191:60146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8mdY0UrI5A3LftIwSpQAAAYs"]
[Tue Mar 17 17:42:03.129799 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:42:03.946132 2026] [:error] [pid 2598:tid 140411624429312] [client 216.73.216.191:27917] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8mxj0p0SRWAqcjGGPVQAAAw4"]
[Tue Mar 17 17:42:10.370723 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:51250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8ohj0p0SRWAqcjGGPWAAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:12.299094 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:48510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8pPPqhzTj3BvfDX-crwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:13.019215 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:34200] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firewalld
[Tue Mar 17 17:42:13.019643 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:34200] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firewalld
[Tue Mar 17 17:42:13.622288 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:48514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8pda6ubjKNq_cu4Yc8wAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:15.123260 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:48518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8p6BJNF7axNlVR0Ut0wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:25.125795 2026] [proxy_fcgi:error] [pid 29151:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:42:26.527488 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:52376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8stY0UrI5A3LftIwSsQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:27.954412 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:34482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8sxj0p0SRWAqcjGGPWgAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:29.373630 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:34492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8taBJNF7axNlVR0Ut1gAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:29.843957 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:41758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8tdY0UrI5A3LftIwStwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:42:30.702680 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:34504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8ttY0UrI5A3LftIwSuQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:32.113900 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:34514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uBj0p0SRWAqcjGGPWwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:32.117502 2026] [mime_magic:error] [pid 2598:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:34514] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:33.594752 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:34518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uQeiSKl8TjouI-Ys9wAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:34.036565 2026] [:error] [pid 2598:tid 140411641214720] [client 216.73.216.191:61373] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uhj0p0SRWAqcjGGPXgAAAww"]
[Tue Mar 17 17:42:35.959109 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:34520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uweiSKl8TjouI-Ys-QAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:37.825809 2026] [:error] [pid 25836:tid 140411557287680] [client 216.73.216.191:29753] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8vYh-PF_25v4hFRB_2QAAARY"]
[Tue Mar 17 17:42:38.750214 2026] [:error] [pid 2598:tid 140411565680384] [client 216.73.216.191:37305] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8vhj0p0SRWAqcjGGPYQAAAxU"]
[Tue Mar 17 17:42:39.464113 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:60060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8vweiSKl8TjouI-Ys-wAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:47.165798 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:42:51.396939 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:60016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8y9Y0UrI5A3LftIwSvQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:51.693211 2026] [:error] [pid 29151:tid 140411716749056] [client 216.73.216.191:5456] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8y_PqhzTj3BvfDX-ctwAAAcM"]
[Tue Mar 17 17:42:54.175483 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:60032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8zgeiSKl8TjouI-YtAQAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:55.301262 2026] [:error] [pid 7004:tid 140411565680384] [client 216.73.216.191:19177] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8z8U6Sx0TG1YjmQjDxgAAApU"]
[Tue Mar 17 17:42:56.963211 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:60044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm80AeiSKl8TjouI-YtAwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:59.188406 2026] [:error] [pid 19507:tid 140411691570944] [client 216.73.216.191:61110] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm809Y0UrI5A3LftIwSwQAAAYY"]
[Tue Mar 17 17:42:59.774407 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:50178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm809Y0UrI5A3LftIwSxAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:01.312906 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:42309] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm81eyqAr6etmhZHNo8bAAAAEk"]
[Tue Mar 17 17:43:03.813489 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:50190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm819Y0UrI5A3LftIwSyAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:08.547988 2026] [:error] [pid 2473:tid 140411616036608] [client 216.73.216.191:53945] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm83KBJNF7axNlVR0Ut3gAAAA8"]
[Tue Mar 17 17:43:10.033888 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47290] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:43:11.813073 2026] [:error] [pid 19507:tid 140411574073088] [client 216.73.216.191:46644] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm839Y0UrI5A3LftIwSywAAAZQ"]
[Tue Mar 17 17:43:12.146751 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:41112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm84PPqhzTj3BvfDX-cugAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:15.157376 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:41116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm846BJNF7axNlVR0Ut4gAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:15.361079 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:41116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm846BJNF7axNlVR0Ut4wAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:17.335020 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:36226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm85QeiSKl8TjouI-YtCQAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:18.739889 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:36230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm85vPqhzTj3BvfDX-cvgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:21.654284 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:36242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm86aBJNF7axNlVR0Ut5QAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:23.102885 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:36250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm869a6ubjKNq_cu4YdAgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:25.295001 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm87Rj0p0SRWAqcjGGPaQAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:27.798843 2026] [:error] [pid 7437:tid 140411699963648] [client 216.73.216.191:34711] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm87weiSKl8TjouI-YtDAAAA8U"]
[Tue Mar 17 17:43:35.901260 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:58520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm89weiSKl8TjouI-YtDgAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:38.048924 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:47260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8-tY0UrI5A3LftIwS0QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:38.121781 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:43:38.266923 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:47260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8-tY0UrI5A3LftIwS0wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:40.237222 2026] [core:alert] [pid 31803:tid 140411683178240] [client 74.7.241.31:47262] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:40.718672 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:47274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8_MU6Sx0TG1YjmQjD1QAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:43.693507 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:47286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8_weiSKl8TjouI-YtEQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:58.188365 2026] [:error] [pid 26799:tid 140411716749056] [client 216.73.216.191:51684] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9Dta6ubjKNq_cu4YdCAAAA0M"]
[Tue Mar 17 17:44:09.053818 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:44:17.235196 2026] [:error] [pid 7004:tid 140411565680384] [client 216.73.216.191:30707] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9IcU6Sx0TG1YjmQjD6gAAApU"]
[Tue Mar 17 17:44:31.029852 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:44:34.987588 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:47286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9MgeiSKl8TjouI-YtKgAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:44:49.787063 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:45666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9QaBJNF7axNlVR0UuAAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:44:53.137786 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48476] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:44:54.458077 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:45670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9RqBJNF7axNlVR0UuCQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:44:57.059576 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:45678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9SQeiSKl8TjouI-YtLQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:45:02.328029 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:47268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9Tta6ubjKNq_cu4YdHwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:45:03.785406 2026] [core:alert] [pid 25836:tid 140411599251200] [client 74.7.243.128:38540] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/tuned
[Tue Mar 17 17:45:05.839582 2026] [:error] [pid 25836:tid 140411741927168] [client 216.73.216.191:3222] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9UYh-PF_25v4hFRCAGAAAAQA"]
[Tue Mar 17 17:45:15.686169 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:45:38.045944 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:46:00.137733 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:46:24.125782 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49758] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:46:51.121807 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:47:14.117779 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:47:36.129797 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:48:00.146297 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:47280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-AIh-PF_25v4hFRCAZwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:48:00.146705 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:48:02.707423 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:37208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-AnIk7brgkOH-rIWiOAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:48:24.767182 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:36374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-GKBJNF7axNlVR0UuQAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:48:25.138752 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:48:47.133823 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:49:09.125795 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:49:34.131711 2026] [proxy_fcgi:error] [pid 29151:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:49:35.315459 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:34272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-X3Ik7brgkOH-rIWiWgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:49:57.125995 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:50:18.129976 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:50:18.161332 2026] [:error] [pid 2473:tid 140411716749056] [client 216.73.216.191:49653] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-iqBJNF7axNlVR0UuWgAAAAM"]
[Tue Mar 17 17:50:34.933971 2026] [:error] [pid 29151:tid 140411649607424] [client 216.73.216.191:52366] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-mvPqhzTj3BvfDX-dTAAAAcs"]
[Tue Mar 17 17:50:40.125815 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:50:41.897094 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:57994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-oeyqAr6etmhZHNo87AAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:50:55.157567 2026] [:error] [pid 25836:tid 140411741927168] [client 216.73.216.191:64268] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-r4h-PF_25v4hFRCAmgAAAQA"]
[Tue Mar 17 17:51:05.125871 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:51:27.120294 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:51:29.131302 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.243.128:47384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-0Yh-PF_25v4hFRCApwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:51:37.665024 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:50204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-2dY0UrI5A3LftIwTSgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:51:49.125821 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:52:12.101828 2026] [proxy_fcgi:error] [pid 29151:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:52:36.729983 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:44742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_FNY0UrI5A3LftIwTaQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:52:39.126434 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:53:02.073846 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55244] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:53:19.631115 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.243.128:34660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_P8U6Sx0TG1YjmQjEcQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:53:25.045876 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:53:47.109808 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:54:11.125772 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:54:12.262063 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:55054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_dNY0UrI5A3LftIwTjQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:54:34.123258 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:54:35.820345 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:38032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_i4h-PF_25v4hFRCA1wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:54:57.129790 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:55:03.587982 2026] [:error] [pid 29151:tid 140411741927168] [client 216.73.216.191:65201] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_p_PqhzTj3BvfDX-dnQAAAcA"]
[Tue Mar 17 17:55:20.128994 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:55:22.488114 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.244.43:40848] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm_ugeiSKl8TjouI-YtrQAAA9A"]
[Tue Mar 17 17:55:22.565219 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.228.61:34150] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm_ugeiSKl8TjouI-YtrgAAA9c"]
[Tue Mar 17 17:55:24.633155 2026] [:error] [pid 25836:tid 140411632822016] [client 216.73.216.191:12895] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_vIh-PF_25v4hFRCA4wAAAQ0"]
[Tue Mar 17 17:55:44.117833 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:04.058614 2026] [:error] [pid 25836:tid 140411590858496] [client 216.73.216.191:27454] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_5Ih-PF_25v4hFRCA6wAAARI"]
[Tue Mar 17 17:56:06.122160 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:28.123093 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:32.967922 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.243.128:40686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAAPPqhzTj3BvfDX-dvwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:56:46.963916 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:55628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnADuyqAr6etmhZHNo9bQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:56:50.134168 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:57.072749 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:58376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAGeyqAr6etmhZHNo9hQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:57:12.129842 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58244] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:57:20.698118 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:59220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAMBj0p0SRWAqcjGGQQAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:57:33.095909 2026] [:error] [pid 2473:tid 140411565680384] [client 216.73.216.191:59730] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAPaBJNF7axNlVR0UuvgAAABU"]
[Tue Mar 17 17:57:36.129985 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58490] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:57:59.097807 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:58:20.453958 2026] [:error] [pid 2473:tid 140411582465792] [client 216.73.216.191:62149] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAbKBJNF7axNlVR0Uu0gAAABM"]
[Tue Mar 17 17:58:23.117976 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:58:41.675424 2026] [:error] [pid 7004:tid 140411641214720] [client 216.73.216.191:1434] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAgcU6Sx0TG1YjmQjExwAAAow"]
[Tue Mar 17 17:58:45.146212 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:11.121772 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:34.126852 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:35.959750 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:38842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAtxj0p0SRWAqcjGGQZwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:59:37.127901 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] [client 205.185.117.70:59502] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 17:59:57.089573 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60530] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:57.707875 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:48336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAzcU6Sx0TG1YjmQjE3gAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:00.778401 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:48338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA0OyqAr6etmhZHNo99AAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:21.101811 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:00:22.445311 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:51522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA5nIk7brgkOH-rIWi8QAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:22.652136 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:51522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA5nIk7brgkOH-rIWi8gAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:22.652172 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.244.43:51660] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnA5nIk7brgkOH-rIWi8wAAAU4"]
[Tue Mar 17 18:00:23.301498 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.228.61:46164] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnA58U6Sx0TG1YjmQjE4gAAApU"]
[Tue Mar 17 18:00:24.863229 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:51526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA6MU6Sx0TG1YjmQjE4wAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:26.477970 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:51534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA6qBJNF7axNlVR0Uu8QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:46.229606 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:51134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA_geiSKl8TjouI-YuBAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:47.151990 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:32784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:08.133562 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:09.222273 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.243.128:38062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBFYh-PF_25v4hFRCBOwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:01:09.957532 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:55648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBFeyqAr6etmhZHNo-BAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:34.077145 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:37.551127 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.243.128:55274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBMRj0p0SRWAqcjGGQgQAAAwQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:42.012391 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:44228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBNta6ubjKNq_cu4YeCQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:43.689903 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.241.31:36392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBN3Ik7brgkOH-rIWjAwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:47.793706 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:36398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBOweiSKl8TjouI-YuFQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:48.396864 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:36398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBPAeiSKl8TjouI-YuFgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:49.787008 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.31:55694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBPaBJNF7axNlVR0UvAAAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:52.078130 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:55710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBQBj0p0SRWAqcjGGQhwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:53.524197 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:55726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBQda6ubjKNq_cu4YeFwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:56.108496 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:56.656376 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:55730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBRNa6ubjKNq_cu4YeHgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:58.006883 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:59092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBRQeiSKl8TjouI-YuGQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:58.163392 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:59092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBRgeiSKl8TjouI-YuGgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:18.128801 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:02:19.656991 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:59102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBWweiSKl8TjouI-YuJgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:22.852332 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:46576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBXcU6Sx0TG1YjmQjE_gAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:24.845073 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:46586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBYPPqhzTj3BvfDX-eBwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:40.137827 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:02:42.271721 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:42070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBcvPqhzTj3BvfDX-eEQAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:02.165823 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:03:04.176023 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:39400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBiMU6Sx0TG1YjmQjFBwAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:17.712794 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:42144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBlRj0p0SRWAqcjGGQogAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:20.747518 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:42160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBmIh-PF_25v4hFRCBXwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:25.513817 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:03:25.838709 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:42188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBncU6Sx0TG1YjmQjFDQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:31.167527 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:45598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBo8U6Sx0TG1YjmQjFEwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:38.861695 2026] [:error] [pid 2473:tid 140411683178240] [client 216.73.216.191:24095] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBqqBJNF7axNlVR0UvJAAAAAc"]
[Tue Mar 17 18:03:48.089840 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:04:00.526821 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:34052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBv9Y0UrI5A3LftIwUMgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:11.125836 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:04:12.496444 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.31:39210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBzAeiSKl8TjouI-YuSwAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:35.134796 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:04:36.563988 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:59706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnB5Bj0p0SRWAqcjGGQswAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:57.684883 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:39944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnB-da6ubjKNq_cu4YeUwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:59.129896 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:05:00.911039 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:39948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnB_Ih-PF_25v4hFRCBcgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:04.076578 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:39954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCAIh-PF_25v4hFRCBdAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:23.129795 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:05:25.016714 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.244.43:37894] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnCFcU6Sx0TG1YjmQjFPAAAAoU"]
[Tue Mar 17 18:05:25.155905 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:49500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCFaBJNF7axNlVR0UvQwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:25.316828 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.228.61:42202] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnCFXIk7brgkOH-rIWjPgAAAVA"]
[Tue Mar 17 18:05:45.125799 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:05:46.535362 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:38480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCKnIk7brgkOH-rIWjPwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:55.467962 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:41628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCM6BJNF7axNlVR0UvSQAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:08.122303 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:06:10.191351 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:49786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCQvPqhzTj3BvfDX-eTwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:13.159448 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:49798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCRRj0p0SRWAqcjGGQywAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:15.449338 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:49804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCRweiSKl8TjouI-YudQAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:18.084743 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:49812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCSnIk7brgkOH-rIWjUQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:32.131369 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37444] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:06:34.167140 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:44514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCWoh-PF_25v4hFRCBjgAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:35.550957 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:44528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCW8U6Sx0TG1YjmQjFUQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:37.075530 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:44544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCXeyqAr6etmhZHNo-VQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:37.575631 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:40210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCXda6ubjKNq_cu4YefwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:38.549643 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:34672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCXoh-PF_25v4hFRCBjwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:58.153859 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:06:59.121847 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.128:44896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCc6BJNF7axNlVR0UvXwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 18:07:02.020871 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:34674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCdMU6Sx0TG1YjmQjFWAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:04.249875 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:59248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCeNa6ubjKNq_cu4YekgAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:07:04.970466 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:55132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCeNa6ubjKNq_cu4YekwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:06.707644 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:55142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCegeiSKl8TjouI-YuggAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:09.567485 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:48334] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt
[Tue Mar 17 18:07:09.567799 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:48334] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt
[Tue Mar 17 18:07:11.269416 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:48340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCf-yqAr6etmhZHNo-XgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:11.808603 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:59252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCf9a6ubjKNq_cu4YemQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:12.745688 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:48348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCgOyqAr6etmhZHNo-YQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:14.808765 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:39534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCguyqAr6etmhZHNo-ZwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:07:15.491402 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:48362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCg-yqAr6etmhZHNo-aAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:17.258941 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:41806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnChQeiSKl8TjouI-YuhAAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:19.109884 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:07:23.896005 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:41814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCi3Ik7brgkOH-rIWjaQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:07:25.594383 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:41820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCjYh-PF_25v4hFRCBmgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:38.410463 2026] [core:alert] [pid 2598:tid 140411716749056] [client 74.7.241.31:41832] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib
[Tue Mar 17 18:07:41.119886 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:08:04.121897 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:08:07.890430 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:39550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCt9Y0UrI5A3LftIwUmAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:08:27.134630 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:08:37.484395 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:55698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC1dY0UrI5A3LftIwUuQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:08:44.295603 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:49990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3MU6Sx0TG1YjmQjFcgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:08:44.824336 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:50624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3Na6ubjKNq_cu4YevQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:08:45.324423 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:50624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3da6ubjKNq_cu4YevgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:08:47.042394 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.243.128:34274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3_PqhzTj3BvfDX-eaQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:08:49.133839 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:09:02.927398 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:49990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC7sU6Sx0TG1YjmQjFgwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:09:11.125891 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:09:29.917210 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:58834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDCXIk7brgkOH-rIWjoAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:09:35.137792 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:09:36.899966 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:34776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDEOyqAr6etmhZHNo-qwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:09:38.594373 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:54630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDEgeiSKl8TjouI-YuogAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:09:47.950794 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:54630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDGweiSKl8TjouI-YuqAAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:09:59.133847 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:10:22.065878 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:10:25.086115 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.244.43:34068] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnDQYh-PF_25v4hFRCBvwAAAQ0"]
[Tue Mar 17 18:10:25.825305 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.228.61:57882] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnDQaBJNF7axNlVR0UvjAAAAA4"]
[Tue Mar 17 18:10:29.605427 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:44898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDRRj0p0SRWAqcjGGRMQAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:10:30.912739 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:35302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDRgeiSKl8TjouI-YurgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:10:32.367950 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:35314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDSOyqAr6etmhZHNo-ugAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:10:33.833511 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:35324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDSda6ubjKNq_cu4Ye3wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:10:48.121840 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:10:49.944730 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:35340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDWQeiSKl8TjouI-YutAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:11:00.254611 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.243.128:34284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDZPPqhzTj3BvfDX-evgAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:11:17.057891 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:11:39.117924 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:11:45.298332 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:59054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDkeyqAr6etmhZHNo-6QAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:12:02.053879 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:12:24.117838 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:12:26.110790 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:52980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDuuyqAr6etmhZHNo--wAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:12:46.030483 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:12:51.101609 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.243.128:43170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnD0_PqhzTj3BvfDX-e2gAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:12:51.821401 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.243.128:43170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnD0_PqhzTj3BvfDX-e2wAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:13:07.133793 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:13:26.931991 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.243.128:47746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnD9oh-PF_25v4hFRCB7AAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:13:29.126010 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43478] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:13:50.129973 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:14:01.919279 2026] [core:alert] [pid 26799:tid 140411649607424] [client 216.73.216.191:43788] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 18:14:11.125814 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:14:32.121859 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:14:54.045721 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:15:16.129813 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:15:25.207483 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.244.43:59798] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnEbeyqAr6etmhZHNo_RwAAAFA"]
[Tue Mar 17 18:15:26.289677 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.228.61:55318] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnEbta6ubjKNq_cu4YfKgAAA1Q"]
[Tue Mar 17 18:15:38.129795 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:15:41.127760 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:41206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnEfRj0p0SRWAqcjGGRyQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:16:01.122594 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:16:02.745934 2026] [core:alert] [pid 2598:tid 140411616036608] [client 74.7.241.31:41206] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var
[Tue Mar 17 18:16:10.139771 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:41448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnEmtY0UrI5A3LftIwVYgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:16:24.125068 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:16:46.091971 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:16:57.719669 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:45302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnEyeyqAr6etmhZHNo_kAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:17:08.128627 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:17:30.125796 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:17:40.151703 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:59198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnE9AeiSKl8TjouI-YvdgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:17:52.125794 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:18:15.119497 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:18:37.129822 2026] [proxy_fcgi:error] [pid 7004:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:18:59.138285 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:19:21.125880 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:19:28.353326 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.128:46962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFYKBJNF7axNlVR0UwfgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:19:43.049832 2026] [proxy_fcgi:error] [pid 29151:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:19:46.344351 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:59078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFchj0p0SRWAqcjGGSPQAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:19:50.814074 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.128:58696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFdqBJNF7axNlVR0UwiAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:19:52.987937 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:41148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFeOyqAr6etmhZHNo_-QAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:20:05.121805 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:20:13.696747 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:33252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFjXIk7brgkOH-rIWk1QAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:20:26.131293 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:20:27.734137 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.228.61:56268] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnFm_PqhzTj3BvfDX-fnAAAAc4"]
[Tue Mar 17 18:20:28.496525 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.244.43:38204] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnFnPPqhzTj3BvfDX-fnQAAAdY"]
[Tue Mar 17 18:20:47.121826 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:21:10.123670 2026] [proxy_fcgi:error] [pid 7004:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:21:11.252089 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:33252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFx3Ik7brgkOH-rIWlBQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:21:14.424215 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:57116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFyhj0p0SRWAqcjGGSagAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:21:16.087287 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:57124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFzOyqAr6etmhZHNpAGwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:21:21.427469 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.243.128:41150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnF0Yh-PF_25v4hFRCC0wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:21:33.581791 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:21:56.133812 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:22:19.125830 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:22:20.279753 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.243.128:35504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGDHIk7brgkOH-rIWlLwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:22:24.642659 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:46896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGEKBJNF7axNlVR0Uw1wAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:22:41.129963 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:22:46.295082 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.128:40726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGJgeiSKl8TjouI-YwFwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:23:03.132285 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:23:25.141854 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:23:30.840245 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:53348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGUtY0UrI5A3LftIwWYAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:23:46.117944 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54994] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:24:08.128116 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:24:30.117809 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:24:44.232215 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:52776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGnHIk7brgkOH-rIWlmwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:24:52.058587 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:25:14.133785 2026] [proxy_fcgi:error] [pid 6296:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:25:27.810887 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.228.61:36646] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnGx3Ik7brgkOH-rIWlrwAAAUo"]
[Tue Mar 17 18:25:28.534506 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.43:37926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnGyKBJNF7axNlVR0UxJAAAAAU"]
[Tue Mar 17 18:25:37.074112 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56946] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:25:59.126141 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:26:03.923980 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:47288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnG6_PqhzTj3BvfDX-gPQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:09.793384 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:55886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnG8aBJNF7axNlVR0UxPQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:11.499031 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:53602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnG89Y0UrI5A3LftIwWqQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:26:21.126645 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:26:24.617435 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:44236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHANa6ubjKNq_cu4YglAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:26:25.331614 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.241.31:53608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHAfPqhzTj3BvfDX-gSAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:43.125872 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:26:44.448265 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:60384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHFHIk7brgkOH-rIWl7QAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:50.626089 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:33570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHGhj0p0SRWAqcjGGTBQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:26:51.304696 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.243.128:45976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHGxj0p0SRWAqcjGGTCAAAAwE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 18:27:05.145842 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:27:27.124501 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59026] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:27:38.126078 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:34342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHSgeiSKl8TjouI-YwqgAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:39.810566 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:57642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHS-yqAr6etmhZHNpAygAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:40.021303 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:57642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHTOyqAr6etmhZHNpAywAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:41.292467 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:57654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHTRj0p0SRWAqcjGGTHwAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:42.695574 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:57668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHToh-PF_25v4hFRCDegAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:50.121995 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:27:51.421504 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:43304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHV9Y0UrI5A3LftIwW3wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:52.891087 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:43308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHWMU6Sx0TG1YjmQjHVQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:54.369440 2026] [:error] [pid 25836:tid 140411641214720] [client 74.7.241.31:43312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHWoh-PF_25v4hFRCDfQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:54.604159 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:43312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHWoh-PF_25v4hFRCDfgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:55.346729 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:43312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHW4h-PF_25v4hFRCDfwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:59.310230 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:43326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHXweiSKl8TjouI-YwtAAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:00.946594 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:51558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHYKBJNF7axNlVR0UxiQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:02.495105 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:51574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHYnIk7brgkOH-rIWmEwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:12.149934 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:28:13.666650 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:51578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHbQeiSKl8TjouI-YwuwAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:13.879958 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:51578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHbQeiSKl8TjouI-YwvAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:15.611600 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:34956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHb6BJNF7axNlVR0UxmQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:16.081501 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.128:59522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHcKBJNF7axNlVR0UxmwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:28:17.111112 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:34960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHcQeiSKl8TjouI-YwwwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:18.300165 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:51272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHcsU6Sx0TG1YjmQjHYgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:19.559062 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:51282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHc-yqAr6etmhZHNpA2gAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:20.864533 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:51298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHdHIk7brgkOH-rIWmGAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:22.095538 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:51302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHdnIk7brgkOH-rIWmGQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:23.474684 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:51314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHd9Y0UrI5A3LftIwW7QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:24.794023 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:51320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHeBj0p0SRWAqcjGGTOwAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:26.103512 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:51334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHesU6Sx0TG1YjmQjHagAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:28.848041 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:56922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHfBj0p0SRWAqcjGGTPgAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:31.175278 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:56936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHf8U6Sx0TG1YjmQjHbwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:32.661364 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:56942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHgMU6Sx0TG1YjmQjHcQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:34.131288 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:56948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHgnIk7brgkOH-rIWmIQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:35.133783 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:28:35.520749 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:56954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHg9a6ubjKNq_cu4Yg5AAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:37.341104 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:55154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHhda6ubjKNq_cu4Yg6gAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:38.911498 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:55160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHhgeiSKl8TjouI-Yw0AAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:40.758215 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:55164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHiNY0UrI5A3LftIwW8wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:42.172769 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.241.31:55180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHinIk7brgkOH-rIWmJAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:43.762385 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:55184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHi3Ik7brgkOH-rIWmJwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:45.145022 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.31:55198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHjaBJNF7axNlVR0UxqAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:46.601323 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:55210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHjhj0p0SRWAqcjGGTRAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:48.016761 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:38322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHkKBJNF7axNlVR0UxqwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:49.595980 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:38336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHkeyqAr6etmhZHNpA8QAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:58.345798 2026] [proxy_fcgi:error] [pid 29151:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:28:58.413677 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:44302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHmgeiSKl8TjouI-Yw1wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:00.495711 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:44310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHnNa6ubjKNq_cu4YhCAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:01.977265 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:44312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHneyqAr6etmhZHNpA-QAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:03.601353 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:44324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHn8U6Sx0TG1YjmQjHfAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:04.976103 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:44336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHoKBJNF7axNlVR0UxswAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:05.438504 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:44336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHoaBJNF7axNlVR0UxtAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:06.783497 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:44338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHonIk7brgkOH-rIWmNAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:08.115208 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:59728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHpBj0p0SRWAqcjGGTTgAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:11.784095 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:59730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHpeyqAr6etmhZHNpA_wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:13.181246 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:59736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHqXIk7brgkOH-rIWmOQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:14.379082 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHqta6ubjKNq_cu4YhFAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:29:22.137821 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:29:23.508802 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:44810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHsweiSKl8TjouI-Yw4wAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:24.536713 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:44810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHtAeiSKl8TjouI-Yw5gAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:26.343082 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:44822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHtoh-PF_25v4hFRCDqgAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:27.877010 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:57746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHt8U6Sx0TG1YjmQjHiQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:32.107637 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.243.128:53628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHvPPqhzTj3BvfDX-glgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:29:32.871170 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:57758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHvKBJNF7axNlVR0UxxwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:34.578944 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:57762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHvtY0UrI5A3LftIwXFwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:36.035210 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.31:57772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHwKBJNF7axNlVR0UxywAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:45.133895 2026] [proxy_fcgi:error] [pid 29151:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:29:47.289392 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:46292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHyweiSKl8TjouI-Yw8gAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:48.689922 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:46296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHzOyqAr6etmhZHNpBFAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:50.095065 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.241.31:46298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHzsU6Sx0TG1YjmQjHmwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:52.340211 2026] [:error] [pid 25836:tid 140411641214720] [client 74.7.241.31:46314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHz4h-PF_25v4hFRCDugAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:53.715674 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:46330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH0QeiSKl8TjouI-Yw-AAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:55.831322 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:46340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH0-yqAr6etmhZHNpBGAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:07.131880 2026] [proxy_fcgi:error] [pid 7004:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33968] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:30:10.348228 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:49388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH4qBJNF7axNlVR0Ux6QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:15.785576 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:39880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH59a6ubjKNq_cu4YhOAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:28.157905 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:30:30.508149 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.228.61:51700] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnH9oh-PF_25v4hFRCDzgAAAQ0"]
[Tue Mar 17 18:30:31.935106 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.43:33958] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnH96BJNF7axNlVR0Ux-QAAAAU"]
[Tue Mar 17 18:30:32.494638 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:52826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH-AeiSKl8TjouI-YxFgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:33.818772 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:44052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH-aBJNF7axNlVR0Ux-wAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:34.354994 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.243.128:34006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH-qBJNF7axNlVR0Ux_AAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:30:37.046857 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.243.128:56194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH_cU6Sx0TG1YjmQjHswAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 18:30:37.153930 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:44058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH_QeiSKl8TjouI-YxHgAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:39.703474 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:50440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH_8U6Sx0TG1YjmQjHuAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:41.367169 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:50450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIAXIk7brgkOH-rIWmZAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:46.727603 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:50462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIBhj0p0SRWAqcjGGTgwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:51.125844 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:30:53.990772 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:56748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIDQeiSKl8TjouI-YxIgAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:54.208024 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:56748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIDgeiSKl8TjouI-YxIwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:55.737171 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:56748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIDgeiSKl8TjouI-YxJAAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:58.965392 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:56760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIEuyqAr6etmhZHNpBQAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:01.318317 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:33782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIFQeiSKl8TjouI-YxJgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:02.991393 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:33784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIFuyqAr6etmhZHNpBRAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:03.131189 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:33784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIF-yqAr6etmhZHNpBRgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:05.204790 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:33790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIGRj0p0SRWAqcjGGTiAAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:31:12.133639 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:31:36.130744 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:31:45.208615 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:57380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIQfPqhzTj3BvfDX-g6AAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:31:58.033814 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:32:05.491711 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:57380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIVfPqhzTj3BvfDX-g_gAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:32:20.125798 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:32:35.143287 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.243.128:56194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIc8U6Sx0TG1YjmQjIGQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:32:42.042250 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:04.127050 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:09.578875 2026] [mime_magic:error] [pid 29151:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:2159] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 18:33:09.579152 2026] [access_compat:error] [pid 29151:tid 140411599251200] [client 216.73.216.191:2159] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 18:33:15.666613 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:49580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnImweiSKl8TjouI-YxkwAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:33:26.133780 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:37.328582 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:49580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIsAeiSKl8TjouI-YxpAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:33:41.702506 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:36584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnItcU6Sx0TG1YjmQjIRQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:33:47.106072 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:48.696189 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:35944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIvBj0p0SRWAqcjGGTvgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:34:11.925155 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:34:35.129238 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:34:41.570358 2026] [core:alert] [pid 19507:tid 140411725141760] [client 74.7.243.128:38090] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/bin
[Tue Mar 17 18:34:44.175984 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:35948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnI9OyqAr6etmhZHNpBswAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:34:57.125804 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:35:18.136800 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:35:29.219017 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:40944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJIda6ubjKNq_cu4Yh4wAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:35:31.740143 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.228.61:56672] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnJI3Ik7brgkOH-rIWm4wAAAUo"]
[Tue Mar 17 18:35:46.129786 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:35:48.746290 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.244.43:41966] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnJNHIk7brgkOH-rIWm7QAAAUY"]
[Tue Mar 17 18:35:56.190967 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.243.128:60528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJPPPqhzTj3BvfDX-hfQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:36:08.125793 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42286] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:36:08.399042 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:42638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJSBj0p0SRWAqcjGGUFQAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:14.595793 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:47426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJTnIk7brgkOH-rIWnAQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:16.315554 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:47436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJUHIk7brgkOH-rIWnAgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:18.674138 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:50570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJUcU6Sx0TG1YjmQjIowAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:30.133796 2026] [proxy_fcgi:error] [pid 6296:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:36:32.848791 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:42932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJYNY0UrI5A3LftIwYdwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:34.207920 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:42942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJYtY0UrI5A3LftIwYewAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:35.361018 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:42954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJYweiSKl8TjouI-YyDwAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:36.892309 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:42970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJZNa6ubjKNq_cu4YiCgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:38.409439 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:43746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJZtY0UrI5A3LftIwYfwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:39.969281 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:43750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJZ8U6Sx0TG1YjmQjIsgAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:42.366817 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:43760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJageiSKl8TjouI-YyGgAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:44.463856 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:43764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJbPPqhzTj3BvfDX-hlgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:47.246073 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:45822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJb9Y0UrI5A3LftIwYhQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:50.151431 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:45830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJcoh-PF_25v4hFRCEmgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:52.130128 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:36:56.851547 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:59612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJeNY0UrI5A3LftIwYigAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:00.899266 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:45834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJfOyqAr6etmhZHNpCDgAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:03.685501 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:38830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJf4h-PF_25v4hFRCErwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:14.097862 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:37:18.094572 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:47638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJjgeiSKl8TjouI-YyJQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:24.178927 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:49104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJlOyqAr6etmhZHNpCGwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:36.097624 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:37:37.437876 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:60948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJofPqhzTj3BvfDX-hqQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:41.099295 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:60956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJpaBJNF7axNlVR0Uy4QAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:43.970153 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:60972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJpweiSKl8TjouI-YyLwAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:58.145845 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:37:59.972385 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:60976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJt8U6Sx0TG1YjmQjI0AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:59.972742 2026] [mime_magic:error] [pid 7004:tid 140411674785536] (70014)End of file found: [client 74.7.241.31:60976] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:00.870894 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:48516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJuHIk7brgkOH-rIWnIwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:01.108269 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:48516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJuXIk7brgkOH-rIWnJQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:04.593397 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:48532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJvKBJNF7axNlVR0Uy6AAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:06.260812 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:48542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJvnIk7brgkOH-rIWnKAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:08.221356 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.243.128:58186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJwBj0p0SRWAqcjGGUUgAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:38:08.894660 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:53764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJwOyqAr6etmhZHNpCPgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:19.198874 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:58076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJy-yqAr6etmhZHNpCRQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:20.134666 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:38:27.950659 2026] [mime_magic:error] [pid 2473:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:58078] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Tue Mar 17 18:38:30.065180 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:49410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ1tY0UrI5A3LftIwYugAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:41.125880 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:38:42.486796 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:58010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ4nIk7brgkOH-rIWnNQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:45.928387 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:58018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ5aBJNF7axNlVR0UzBQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:56.127389 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.243.128:42010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ8Ih-PF_25v4hFRCE1AAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:39:04.045876 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:39:12.159926 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:51582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKANY0UrI5A3LftIwYzgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:13.019097 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:51582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKAdY0UrI5A3LftIwYzwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:15.555019 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:58762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKA_PqhzTj3BvfDX-hzwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:19.038993 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:44534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKBcU6Sx0TG1YjmQjI9AAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:26.141812 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:39:29.393652 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:41252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKEdY0UrI5A3LftIwY3AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:31.012509 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:41260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKE3Ik7brgkOH-rIWnTwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:32.499352 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:41268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKFMU6Sx0TG1YjmQjI-AAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:33.932954 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:41270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKFcU6Sx0TG1YjmQjI-QAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:37.166232 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:41284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKGBj0p0SRWAqcjGGUdAAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:38.551904 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:46828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKGqBJNF7axNlVR0UzHQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:48.153942 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:39:49.927122 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:46834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKJaBJNF7axNlVR0UzIgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:52.356092 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:46834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKKKBJNF7axNlVR0UzJAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:54.090457 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:52936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKKta6ubjKNq_cu4YiUAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:55.559812 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:52948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKK9Y0UrI5A3LftIwY6gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:57.736726 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:50062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKLYh-PF_25v4hFRCE8gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:10.129846 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:40:14.807459 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:50078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKPoh-PF_25v4hFRCFAAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:16.645132 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:57928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKQPPqhzTj3BvfDX-h5wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:18.802992 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:54700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKQta6ubjKNq_cu4YiWgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:21.725474 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:54706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKRcU6Sx0TG1YjmQjJFwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:32.125801 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:40:34.952168 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.228.61:56668] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnKUnIk7brgkOH-rIWnXwAAAUs"]
[Tue Mar 17 18:40:34.959309 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:37918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKUsU6Sx0TG1YjmQjJJwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:38.241783 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] [client 45.80.158.167:51424] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 18:40:38.831490 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:34410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKVta6ubjKNq_cu4YiYQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:41.067043 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:34422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKWXIk7brgkOH-rIWnZQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:42.531403 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:34432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKWnIk7brgkOH-rIWnaAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:55.135628 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49492] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:40:59.203256 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.244.43:60678] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnKa6BJNF7axNlVR0UzOwAAAAE"]
[Tue Mar 17 18:41:04.198398 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.128:33936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKcAeiSKl8TjouI-YynQAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:41:16.301797 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:34444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKfOyqAr6etmhZHNpClgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:17.154448 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:41:19.989169 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:44554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKfxj0p0SRWAqcjGGUlwAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:21.290861 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:44570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKgdY0UrI5A3LftIwZDAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:28.168147 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:44572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKiKBJNF7axNlVR0UzSwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:37.788010 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:43676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKkaBJNF7axNlVR0UzTwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:39.137795 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:02.126821 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:11.607795 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:43682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKstY0UrI5A3LftIwZLQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:12.942258 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:37496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKtBj0p0SRWAqcjGGUsgAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:15.104397 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:37508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKt3Ik7brgkOH-rIWnmgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:24.125831 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:26.243970 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:54064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKwgeiSKl8TjouI-YyywAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:29.241456 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:34452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKxaBJNF7axNlVR0UzbwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:29.446882 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:34452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKxaBJNF7axNlVR0UzcAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:32.875650 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.243.128:53012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKyHIk7brgkOH-rIWnpwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:33.714485 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:34464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKyRj0p0SRWAqcjGGUugAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:34.237248 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:34464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKyhj0p0SRWAqcjGGUvAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:46.405791 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:48.971683 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:34478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK2AeiSKl8TjouI-Yy1gAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:50.248420 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:38346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK2uyqAr6etmhZHNpCvAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:52.363611 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:38352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK3HIk7brgkOH-rIWnsQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:53.761195 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:38364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK3fPqhzTj3BvfDX-iPAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:55.145445 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:38376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK33Ik7brgkOH-rIWntAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:08.123822 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:43:15.639333 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:48542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK84h-PF_25v4hFRCFVgAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:18.465916 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:44980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK9sU6Sx0TG1YjmQjJZAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:20.941459 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:44994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK-NY0UrI5A3LftIwZTwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:30.045849 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:43:39.348824 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:40352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLC4h-PF_25v4hFRCFbAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:43:45.375227 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:45006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLEaBJNF7axNlVR0UzlAAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:43:52.127466 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:43:54.252065 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:51070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLGvPqhzTj3BvfDX-iTAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:44:01.210134 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.243.128:58916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLIcU6Sx0TG1YjmQjJdgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:44:03.411468 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.243.128:33566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLI3Ik7brgkOH-rIWnzQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:44:05.912407 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.128:33568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLJaBJNF7axNlVR0UznQAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:44:07.546617 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.128:33572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLJweiSKl8TjouI-Yy9gAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:44:17.128661 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:44:26.179774 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:51072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLOoh-PF_25v4hFRCFhwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:44:39.071493 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:44:40.934632 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:39750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLSNY0UrI5A3LftIwZdQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:44:43.088472 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:39750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLS9Y0UrI5A3LftIwZeQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:44:57.595560 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.243.128:35296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLWcU6Sx0TG1YjmQjJmgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:45:00.129792 2026] [proxy_fcgi:error] [pid 7437:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:45:21.143323 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:45:43.174633 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:45:47.871454 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.243.128:60056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLi4h-PF_25v4hFRCFrgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:46:05.057804 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:46:08.934567 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:35516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLoBj0p0SRWAqcjGGVFAAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:46:28.127044 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:46:29.895299 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:59840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLtfPqhzTj3BvfDX-imAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:46:50.132135 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:47:13.129822 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:47:14.270764 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:51234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnL4oh-PF_25v4hFRCF3QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:47:21.660199 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:51234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnL6Yh-PF_25v4hFRCF5AAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:47:36.145901 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:47:38.038554 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:34100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnL-tY0UrI5A3LftIwZ_wAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:47:58.125859 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:48:06.761196 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.128:46378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMFqBJNF7axNlVR0U0CAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:48:17.516094 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:47820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMIcU6Sx0TG1YjmQjKEwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:48:21.139317 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:48:23.455789 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:44502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMJ-yqAr6etmhZHNpDWgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:48:43.529788 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:48:47.125552 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:46440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMPuyqAr6etmhZHNpDbwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:49:00.702593 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.128:55118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMTAeiSKl8TjouI-YzdQAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:49:06.125785 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:49:21.475159 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.128:38730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMYQeiSKl8TjouI-YzgwAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:49:28.121768 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:49:50.130404 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:50:09.271308 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:60766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMkfPqhzTj3BvfDX-jGwAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:11.134799 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:42926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMkxj0p0SRWAqcjGGVfwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:50:12.057845 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:50:17.842358 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.128:48488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMmaBJNF7axNlVR0U0XAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:34.133886 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:50:35.191019 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:42940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMq-yqAr6etmhZHNpDswAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:50:36.822264 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:45548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMrPPqhzTj3BvfDX-jJAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:51.518840 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:39630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMuweiSKl8TjouI-YzuQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:56.073872 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:51:18.642957 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:51:41.129820 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:52:03.121803 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:52:26.129809 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:52:48.129905 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:53:10.145799 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40330] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:53:32.053961 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40814] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:53:36.675774 2026] [mime_magic:error] [pid 6296:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:36714] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet
[Tue Mar 17 18:53:36.675930 2026] [access_compat:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:36714] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet
[Tue Mar 17 18:53:47.515917 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.243.128:60110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnNa_PqhzTj3BvfDX-jrwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:53:54.141793 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:54:16.136009 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:54:43.133774 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:54:53.132673 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:50166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnNrQeiSKl8TjouI-Y0OgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:55:06.153780 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:55:27.133794 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:55:50.561775 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:55:51.803534 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.228.61:41882] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnN5-yqAr6etmhZHNpETQAAAFg"]
[Tue Mar 17 18:56:12.155889 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:56:18.339688 2026] [:error] [pid 11088:tid 140411590858496] [client 74.7.244.43:37718] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnOAmmqtCojLHvu5cKEpwAAAJI"]
[Tue Mar 17 18:56:35.141798 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46308] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:56:57.119053 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46996] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:57:19.125877 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:57:24.906567 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.128:54306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnORKBJNF7axNlVR0U1KgAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:57:41.119661 2026] [proxy_fcgi:error] [pid 7437:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:57:48.789914 2026] [mime_magic:error] [pid 11088:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:44520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/libexec/selinux
[Tue Mar 17 18:57:48.790226 2026] [access_compat:error] [pid 11088:tid 140411632822016] [client 74.7.243.128:44520] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/libexec/selinux
[Tue Mar 17 18:58:04.133795 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:58:14.479795 2026] [core:alert] [pid 26799:tid 140411699963648] [client 74.7.241.31:42674] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/rpm/platform
[Tue Mar 17 18:58:18.059148 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.243.128:43496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOeYh-PF_25v4hFRCG8wAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:58:20.438341 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:57718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOe-yqAr6etmhZHNpEfgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:58:22.127497 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:57730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOfuyqAr6etmhZHNpEfwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:58:26.129777 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:58:45.179389 2026] [:error] [pid 13577:tid 140411582465792] [client 74.7.243.128:50756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOkxHAU4oLqO8Bq2ow8AAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:58:48.125843 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:59:10.141821 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:59:32.121846 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:59:50.087471 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.243.128:48968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnO1mmqtCojLHvu5cKFLgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:59:54.149516 2026] [proxy_fcgi:error] [pid 12042:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:00:17.137841 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:00:39.161959 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:00:53.102219 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.228.61:46992] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnPFaBJNF7axNlVR0U1igAAAAA"]
[Tue Mar 17 19:01:02.825897 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:01:07.338535 2026] [core:alert] [pid 11088:tid 140411624429312] [client 74.7.243.128:48968] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/include/mtd/ubi-user.h&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/include/mtd
[Tue Mar 17 19:01:14.896039 2026] [mime_magic:error] [pid 11561:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:48500] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/firmware
[Tue Mar 17 19:01:19.717523 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.244.43:37120] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnPL6BJNF7axNlVR0U1lwAAABI"]
[Tue Mar 17 19:01:25.120539 2026] [proxy_fcgi:error] [pid 11088:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:01:41.991375 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.128:33554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnPRaBJNF7axNlVR0U1qAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:01:52.221848 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:02:13.133794 2026] [proxy_fcgi:error] [pid 12042:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:02:36.131027 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:02:58.158208 2026] [proxy_fcgi:error] [pid 11088:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:03:20.557802 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:03:42.163741 2026] [proxy_fcgi:error] [pid 11088:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:04.087995 2026] [proxy_fcgi:error] [pid 13577:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:26.137855 2026] [proxy_fcgi:error] [pid 13577:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:49.161854 2026] [proxy_fcgi:error] [pid 11088:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:59.333330 2026] [:error] [pid 11561:tid 140411649607424] [client 74.7.243.128:42644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQC4U5aF1mYwvX5tc3UgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:05:12.141802 2026] [proxy_fcgi:error] [pid 13577:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34532] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:05:19.247550 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:55112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQH3Ik7brgkOH-rIWqGQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:05:34.141819 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:05:38.718475 2026] [:error] [pid 11088:tid 140411632822016] [client 74.7.243.128:38994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQMmmqtCojLHvu5cKFhwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 19:05:40.379143 2026] [:error] [pid 11088:tid 140411599251200] [client 74.7.243.128:40150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQNGmqtCojLHvu5cKFiQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:05:40.844967 2026] [:error] [pid 11088:tid 140411674785536] [client 216.73.216.191:57488] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQNGmqtCojLHvu5cKFigAAAIg"]
[Tue Mar 17 19:05:57.317833 2026] [proxy_fcgi:error] [pid 12042:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35942] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:05:58.374508 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.243.128:42204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQRsU6Sx0TG1YjmQjLiAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:06:00.020825 2026] [:error] [pid 12775:tid 140411725141760] [client 74.7.228.61:49008] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnQSCYKDPifM2h9AK6-7QAAAsI"]
[Tue Mar 17 19:06:02.425689 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:42204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQSsU6Sx0TG1YjmQjLjQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:06:20.090941 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:06:24.027228 2026] [:error] [pid 11088:tid 140411607643904] [client 74.7.244.43:45594] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnQYGmqtCojLHvu5cKFjgAAAJA"]
[Tue Mar 17 19:06:42.069833 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:07:03.137782 2026] [proxy_fcgi:error] [pid 11561:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:07:24.125891 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:07:25.180983 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:57322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQneyqAr6etmhZHNpE5wAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:07:29.710618 2026] [:error] [pid 11561:tid 140411641214720] [client 74.7.243.128:37596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQoYU5aF1mYwvX5tc3WAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:07:45.137824 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37756] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:08:07.131608 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:08:29.133795 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:08:50.136034 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:12.146065 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:14.731264 2026] [core:alert] [pid 2598:tid 140411574073088] [client 74.7.243.128:45294] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/include
[Tue Mar 17 19:09:35.122738 2026] [proxy_fcgi:error] [pid 7437:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:57.129793 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:57.462180 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.243.128:49724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnRNWmqtCojLHvu5cKFtgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:10:02.411716 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:41676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnROta6ubjKNq_cu4Yk3QAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:10:18.137411 2026] [proxy_fcgi:error] [pid 11088:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40040] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:10:40.041852 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:10:45.605271 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.243.128:34610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnRZcU6Sx0TG1YjmQjL2QAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:11:02.109013 2026] [proxy_fcgi:error] [pid 7437:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:11:21.320615 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.228.61:53546] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnRifPqhzTj3BvfDX-lHgAAAcs"]
[Tue Mar 17 19:11:24.121850 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41122] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:11:37.948190 2026] [:error] [pid 11088:tid 140411658000128] [client 74.7.244.43:59520] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnRmWmqtCojLHvu5cKFyAAAAIo"]
[Tue Mar 17 19:11:46.045826 2026] [proxy_fcgi:error] [pid 12775:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:12:08.069976 2026] [proxy_fcgi:error] [pid 25836:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:12:30.057841 2026] [proxy_fcgi:error] [pid 12775:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:12:33.342596 2026] [:error] [pid 11088:tid 140411658000128] [client 74.7.243.128:51536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnR0WmqtCojLHvu5cKF2wAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:12:52.134995 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:13:14.121179 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:13:37.122109 2026] [proxy_fcgi:error] [pid 11561:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:13:59.033875 2026] [proxy_fcgi:error] [pid 11088:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:14:21.119729 2026] [proxy_fcgi:error] [pid 11561:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:14:44.130010 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:15:06.139773 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:15:28.133803 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:15:50.129782 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:16:24.125863 2026] [proxy_fcgi:error] [pid 29151:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:16:25.570923 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.228.61:41692] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnSuXIk7brgkOH-rIWqkgAAAVE"]
[Tue Mar 17 19:16:38.192571 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.244.43:56638] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnSxgeiSKl8TjouI-Y1aQAAA8M"]
[Tue Mar 17 19:16:51.849797 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:17:14.121848 2026] [proxy_fcgi:error] [pid 11088:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:17:23.931849 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:36350] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnS89Y0UrI5A3LftIwcTwAAAY0"]
[Tue Mar 17 19:17:36.119011 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:17:58.121826 2026] [proxy_fcgi:error] [pid 12775:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:18:17.501798 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.243.128:60080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnTKWmqtCojLHvu5cKGRgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:18:21.064075 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:18:43.133807 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:19:05.131686 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:19:27.125893 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48652] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:19:49.129789 2026] [proxy_fcgi:error] [pid 11088:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:20:01.416737 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.243.128:53740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnTkWmqtCojLHvu5cKGbgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:20:11.109264 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:20:32.125782 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:20:54.106636 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:21:16.129877 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:21:38.649559 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.228.61:51876] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnT8sU6Sx0TG1YjmQjNDQAAAoQ"]
[Tue Mar 17 19:21:39.363930 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.244.43:39676] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnT82mqtCojLHvu5cKGjwAAAIE"]
[Tue Mar 17 19:21:48.119386 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:22:09.129779 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:22:25.866719 2026] [:error] [pid 11088:tid 140411649607424] [client 74.7.243.128:53740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUIWmqtCojLHvu5cKGpwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:22:36.129870 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:00.133805 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:10.878687 2026] [core:alert] [pid 11088:tid 140411590858496] [client 74.7.243.128:53740] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:23:23.124284 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:45.121789 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:52.374541 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.243.128:58378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUeIh-PF_25v4hFRCInAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:24:07.129805 2026] [proxy_fcgi:error] [pid 7004:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52286] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:24:16.679421 2026] [:error] [pid 2598:tid 140411548894976] [client 216.73.216.191:8927] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUkBj0p0SRWAqcjGGX_wAAAxc"]
[Tue Mar 17 19:24:17.481407 2026] [:error] [pid 7004:tid 140411607643904] [client 216.73.216.191:30584] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUkcU6Sx0TG1YjmQjNQAAAApA"]
[Tue Mar 17 19:24:20.803443 2026] [:error] [pid 31803:tid 140411599251200] [client 216.73.216.191:13762] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUlOyqAr6etmhZHNpF1QAAAFE"]
[Tue Mar 17 19:24:29.125896 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:24:44.222431 2026] [:error] [pid 11816:tid 140411708356352] [client 216.73.216.191:57954] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUrOw_le52K8_3pV1r5AAAAgQ"]
[Tue Mar 17 19:24:51.082211 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:24:52.945347 2026] [:error] [pid 26799:tid 140411590858496] [client 216.73.216.191:35860] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUtNa6ubjKNq_cu4YlvQAAA1I"]
[Tue Mar 17 19:25:06.959517 2026] [:error] [pid 29151:tid 140411540502272] [client 216.73.216.191:51552] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUwvPqhzTj3BvfDX-mPwAAAdg"]
[Tue Mar 17 19:25:09.370472 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:60852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUxew_le52K8_3pV1r-AAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 19:25:13.117790 2026] [proxy_fcgi:error] [pid 6296:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:25:22.832317 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:39487] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU0ta6ubjKNq_cu4YlxwAAA0E"]
[Tue Mar 17 19:25:34.133847 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:25:36.866757 2026] [:error] [pid 11816:tid 140411574073088] [client 216.73.216.191:57610] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU4Ow_le52K8_3pV1sAgAAAhQ"]
[Tue Mar 17 19:25:43.173414 2026] [:error] [pid 7004:tid 140411674785536] [client 216.73.216.191:43045] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU58U6Sx0TG1YjmQjNdgAAAog"]
[Tue Mar 17 19:25:56.129836 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:25:57.234852 2026] [:error] [pid 6296:tid 140411674785536] [client 216.73.216.191:24324] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU9XIk7brgkOH-rIWrNQAAAUg"]
[Tue Mar 17 19:25:58.589086 2026] [core:alert] [pid 11088:tid 140411565680384] [client 74.7.243.128:54970] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 19:26:18.129802 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:26:21.507709 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.241.31:33390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVDWmqtCojLHvu5cKHOQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:26:29.708059 2026] [:error] [pid 11088:tid 140411699963648] [client 216.73.216.191:11609] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVFWmqtCojLHvu5cKHQQAAAIU"]
[Tue Mar 17 19:26:39.611269 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.228.61:33110] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnVH2mqtCojLHvu5cKHRAAAAIA"]
[Tue Mar 17 19:26:40.057863 2026] [proxy_fcgi:error] [pid 11088:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54780] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:26:40.821761 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.244.43:51658] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnVIMU6Sx0TG1YjmQjNkAAAAo0"]
[Tue Mar 17 19:26:45.107178 2026] [:error] [pid 29151:tid 140411683178240] [client 216.73.216.191:47375] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVJfPqhzTj3BvfDX-mYwAAAcc"]
[Tue Mar 17 19:26:54.284603 2026] [:error] [pid 11816:tid 140411733534464] [client 216.73.216.191:56701] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVLew_le52K8_3pV1sIQAAAgE"]
[Tue Mar 17 19:27:01.069825 2026] [proxy_fcgi:error] [pid 29151:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:27:01.295710 2026] [:error] [pid 31803:tid 140411674785536] [client 216.73.216.191:18981] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVNeyqAr6etmhZHNpGEAAAAEg"]
[Tue Mar 17 19:27:09.339193 2026] [:error] [pid 19507:tid 140411725141760] [client 216.73.216.191:2351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVPdY0UrI5A3LftIwdeAAAAYI"]
[Tue Mar 17 19:27:32.125794 2026] [proxy_fcgi:error] [pid 11088:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:27:54.076563 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:28:15.133791 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:28:26.822921 2026] [:error] [pid 25836:tid 140411616036608] [client 216.73.216.191:1207] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVioh-PF_25v4hFRCJCwAAAQ8"]
[Tue Mar 17 19:28:37.121216 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:28:48.672948 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:53836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVoNY0UrI5A3LftIwdvgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:28:59.118315 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:29:00.192363 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:58632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVrHIk7brgkOH-rIWrpAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:29:02.933540 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:58332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVrhj0p0SRWAqcjGGYZAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:29:03.260762 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:58310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVr-yqAr6etmhZHNpGRQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:29:21.138861 2026] [proxy_fcgi:error] [pid 25836:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:29:31.003609 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:44072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVy9a6ubjKNq_cu4YmNwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:29:35.718742 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:58336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVz9a6ubjKNq_cu4YmOwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:29:45.128374 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:08.122026 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:29.125779 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:52.129824 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59594] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:58.015426 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.243.128:41152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnWIWmqtCojLHvu5cKH7gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:31:05.076775 2026] [:error] [pid 25836:tid 140411674785536] [client 216.73.216.191:1944] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnWKYh-PF_25v4hFRCJUwAAAQg"]
[Tue Mar 17 19:31:14.780115 2026] [:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:63560] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnWMta6ubjKNq_cu4YmWwAAA1Q"]
[Tue Mar 17 19:31:16.170258 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:31:38.124575 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:31:42.416111 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.244.43:57698] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnWTew_le52K8_3pV1shAAAAgc"]
[Tue Mar 17 19:31:42.422819 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.228.61:49532] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnWTuw_le52K8_3pV1shwAAAgE"]
[Tue Mar 17 19:32:00.129832 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:32:22.145787 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:32:45.122829 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33488] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:33:07.125387 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:33:29.145824 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:33:51.132119 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:34:14.131550 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:34:15.928228 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:53794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnW5-yqAr6etmhZHNpGwgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:34:37.109809 2026] [proxy_fcgi:error] [pid 11088:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:34:43.141337 2026] [mime_magic:error] [pid 7004:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:3205] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 19:34:43.141618 2026] [access_compat:error] [pid 7004:tid 140411565680384] [client 216.73.216.191:3205] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 19:34:52.993138 2026] [:error] [pid 11816:tid 140411590858496] [client 216.73.216.191:58688] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXDOw_le52K8_3pV1ssQAAAhI"]
[Tue Mar 17 19:35:00.245875 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:35:02.616234 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.243.128:44186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXFnIk7brgkOH-rIWsDgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:35:04.978203 2026] [:error] [pid 25836:tid 140411540502272] [client 216.73.216.191:33969] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXGIh-PF_25v4hFRCJeQAAARg"]
[Tue Mar 17 19:35:06.399925 2026] [:error] [pid 7004:tid 140411607643904] [client 216.73.216.191:26291] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXGsU6Sx0TG1YjmQjOUgAAApA"]
[Tue Mar 17 19:35:22.125787 2026] [proxy_fcgi:error] [pid 11088:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:35:41.191449 2026] [:error] [pid 7004:tid 140411716749056] [client 216.73.216.191:20769] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXPcU6Sx0TG1YjmQjOWgAAAoM"]
[Tue Mar 17 19:35:44.109808 2026] [proxy_fcgi:error] [pid 11088:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37682] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:35:52.740775 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:34274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXSBj0p0SRWAqcjGGY5gAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:35:53.090756 2026] [:error] [pid 31803:tid 140411557287680] [client 216.73.216.191:51648] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXSeyqAr6etmhZHNpG4AAAAFY"]
[Tue Mar 17 19:36:06.057819 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:36:07.403930 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.241.31:39270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXV2mqtCojLHvu5cKIzQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:36:09.550567 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:39278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXWYh-PF_25v4hFRCJkAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:36:12.262643 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:39288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXXBj0p0SRWAqcjGGY7wAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:36:28.129778 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:36:42.130813 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.244.43:43774] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnXehj0p0SRWAqcjGGY9AAAAwg"]
[Tue Mar 17 19:36:42.864855 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.228.61:37278] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnXeoh-PF_25v4hFRCJmQAAAQU"]
[Tue Mar 17 19:36:45.076226 2026] [:error] [pid 11816:tid 140411733534464] [client 216.73.216.191:22921] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXfew_le52K8_3pV1s0gAAAgE"]
[Tue Mar 17 19:36:50.120315 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38924] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:12.125912 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:16.450338 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:39292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXnHIk7brgkOH-rIWsRQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:17.198772 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:42700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXneyqAr6etmhZHNpHCQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:22.263469 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:42348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXotY0UrI5A3LftIweZwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:34.122542 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:36.145598 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:40668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXsNa6ubjKNq_cu4YmvAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:38.344287 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:53032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXssU6Sx0TG1YjmQjOgQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:39.975850 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:53040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXs3Ik7brgkOH-rIWsTAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:41.586779 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:53054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXteyqAr6etmhZHNpHCwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:42.059508 2026] [:error] [pid 29151:tid 140411666392832] [client 216.73.216.191:14180] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXtvPqhzTj3BvfDX-nLgAAAck"]
[Tue Mar 17 19:37:43.557961 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.241.31:53064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXt2mqtCojLHvu5cKJBQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:55.121654 2026] [proxy_fcgi:error] [pid 11088:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:56.523081 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:53046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXxNa6ubjKNq_cu4YmwAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:58.630742 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:54336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXxtY0UrI5A3LftIwedgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:00.089390 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:54344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXyNY0UrI5A3LftIweeQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:01.737080 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:54346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXyeyqAr6etmhZHNpHEQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:03.299481 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:54356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXy-w_le52K8_3pV1s5QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:04.831308 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:54364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXzMU6Sx0TG1YjmQjOiAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:05.721800 2026] [:error] [pid 29151:tid 140411624429312] [client 216.73.216.191:28217] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXzfPqhzTj3BvfDX-nMQAAAc4"]
[Tue Mar 17 19:38:06.293974 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:54366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXzuw_le52K8_3pV1s5wAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:17.121832 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:38:17.793948 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:38124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX2Rj0p0SRWAqcjGGZBgAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:19.990411 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:38140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX2-w_le52K8_3pV1s6gAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:21.524999 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:38154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX3eyqAr6etmhZHNpHFQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:24.044426 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:38156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4HIk7brgkOH-rIWsWAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:24.813619 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:55808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4NY0UrI5A3LftIwehgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:38:25.720216 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:38158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4cU6Sx0TG1YjmQjOjgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:27.875638 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:47154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4-yqAr6etmhZHNpHFwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:29.375722 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:47162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX5da6ubjKNq_cu4YmyAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:38.133794 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:38:41.308601 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:47720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX8OyqAr6etmhZHNpHGQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:42.876096 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:47732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX8tY0UrI5A3LftIweiQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:44.208803 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:47742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX9MU6Sx0TG1YjmQjOlAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:01.092060 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:39:09.211256 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:47744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYDew_le52K8_3pV1tAAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:12.119292 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:46374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYEIh-PF_25v4hFRCJvwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:13.853042 2026] [:error] [pid 11088:tid 140411649607424] [client 74.7.241.31:46386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYEWmqtCojLHvu5cKJFQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:23.128960 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:39:45.125886 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:39:49.673578 2026] [core:alert] [pid 2598:tid 140411616036608] [client 74.7.243.128:35544] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 19:40:07.129772 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:40:30.959181 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:40:52.133825 2026] [proxy_fcgi:error] [pid 11088:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:40:57.366835 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:39864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYeYh-PF_25v4hFRCJ7wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:41:14.133412 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:41:36.069841 2026] [proxy_fcgi:error] [pid 29151:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:41:43.571067 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.244.43:41528] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnYp9Y0UrI5A3LftIwerQAAAZI"]
[Tue Mar 17 19:41:44.308805 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.228.61:35462] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnYqOyqAr6etmhZHNpHNwAAAEc"]
[Tue Mar 17 19:41:58.113838 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:42:21.129833 2026] [proxy_fcgi:error] [pid 29151:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:42:26.041844 2026] [mime_magic:error] [pid 11088:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:46844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/systemd
[Tue Mar 17 19:42:43.129871 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:42:54.463332 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:33116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnY7vPqhzTj3BvfDX-nhAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:43:06.133814 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44334] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:43:11.098602 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.243.128:49584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnY_2mqtCojLHvu5cKJZgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:43:15.624881 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:43066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZA3Ik7brgkOH-rIWsnQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:43:25.257581 2026] [:error] [pid 11088:tid 140411716749056] [client 74.7.243.128:49584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZDWmqtCojLHvu5cKJbwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:43:28.137850 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:43:50.046036 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:44:13.085834 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:44:35.141837 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:44:40.408724 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:44644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZWBj0p0SRWAqcjGGZuQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:41.412032 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:44644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZWRj0p0SRWAqcjGGZugAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:43.513202 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZW9Y0UrI5A3LftIwe2gAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:44.835227 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:40192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZXPPqhzTj3BvfDX-nnAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:46.262992 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:40196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZXvPqhzTj3BvfDX-nngAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:57.117781 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:45:18.129813 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:45:19.964863 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:51054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZfxj0p0SRWAqcjGGZ1AAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:45:40.129794 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:46:02.161812 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:46:03.895565 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:35246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZq9a6ubjKNq_cu4YnYwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:46:24.137592 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:46:25.355819 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.243.128:44316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZwWmqtCojLHvu5cKJlQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:46:34.541005 2026] [:error] [pid 7004:tid 140411708356352] [client 204.12.208.18:64445] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abnZysU6Sx0TG1YjmQjPTgAAAoQ"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Tue Mar 17 19:46:46.123338 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:07.128712 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:30.369249 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:53.137765 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:54.126633 2026] [mime_magic:error] [pid 7004:tid 140411741927168] (70014)End of file found: [client 74.7.243.128:43594] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system
[Tue Mar 17 19:47:54.126940 2026] [access_compat:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:43594] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system
[Tue Mar 17 19:48:15.123050 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:48:18.516350 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:51600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaMnIk7brgkOH-rIWs_AAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:48:27.909942 2026] [mime_magic:error] [pid 7004:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:52336] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system/multi-user.target.wants
[Tue Mar 17 19:48:27.910088 2026] [access_compat:error] [pid 7004:tid 140411590858496] [client 74.7.243.128:52336] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system/multi-user.target.wants
[Tue Mar 17 19:48:37.110284 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:00.065810 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:23.127603 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:26.371133 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:41480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaduw_le52K8_3pV1tiAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:43.736847 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnah9Y0UrI5A3LftIwfGAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:45.283013 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaida6ubjKNq_cu4YnqQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:46.121933 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:48.163395 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:51878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnajIh-PF_25v4hFRCKdAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:57.780398 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:51926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaldY0UrI5A3LftIwfGgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:59.987557 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.241.31:51932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnal2mqtCojLHvu5cKJzQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:01.500824 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:51936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnamdY0UrI5A3LftIwfIAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:01.760418 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:51936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnamdY0UrI5A3LftIwfIQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:06.122439 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:51938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnansU6Sx0TG1YjmQjPmQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:07.839548 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:34446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnan-yqAr6etmhZHNpHqQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:08.121822 2026] [proxy_fcgi:error] [pid 11088:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:50:30.124740 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:50:52.120899 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:51:03.680205 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:34448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abna1xj0p0SRWAqcjGGaRwAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:51:06.177785 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:47638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abna2sU6Sx0TG1YjmQjPrQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:51:14.125811 2026] [proxy_fcgi:error] [pid 11088:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:51:36.045855 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51214] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:51:58.121865 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:52:34.053900 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:52:56.025799 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:53:18.137793 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:53:39.793861 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52668] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:54:02.133821 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:54:25.101826 2026] [proxy_fcgi:error] [pid 11088:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:54:28.779059 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.243.128:46272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnbpMU6Sx0TG1YjmQjP9wAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:54:48.133830 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:55:10.129859 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:55:32.141761 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:55:55.125882 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:56:17.033814 2026] [proxy_fcgi:error] [pid 11088:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:56:39.121787 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:02.157792 2026] [proxy_fcgi:error] [pid 11088:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:24.129774 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:27.371075 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:53128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abncV9Y0UrI5A3LftIwfzQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:57:37.539204 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.228.61:39364] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abncYcU6Sx0TG1YjmQjQOQAAAoo"]
[Tue Mar 17 19:57:37.714365 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.244.43:35016] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abncYcU6Sx0TG1YjmQjQOgAAAoA"]
[Tue Mar 17 19:57:57.123463 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:58.921851 2026] [mime_magic:error] [pid 6296:tid 140411607643904] (70014)End of file found: [client 74.7.241.31:47812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 19:58:17.501234 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.243.128:38536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnciYh-PF_25v4hFRCLDgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:58:20.129210 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56682] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:58:42.125876 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:05.129628 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:28.120869 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:50.121981 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:58.612284 2026] [mime_magic:error] [pid 6296:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:59088] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/opt/bacula
[Tue Mar 17 20:00:13.130343 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:00:18.054280 2026] [mime_magic:error] [pid 29151:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:42684] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Tue Mar 17 20:00:18.054645 2026] [access_compat:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:42684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Tue Mar 17 20:00:35.126723 2026] [proxy_fcgi:error] [pid 11088:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:00:38.316368 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.241.31:51854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abndFoh-PF_25v4hFRCLPwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:01:00.147375 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:01:22.030140 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:01:43.085823 2026] [proxy_fcgi:error] [pid 29151:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:01:51.519228 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.243.128:47124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abndXxj0p0SRWAqcjGGbBgAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:02:05.224901 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:02:09.655700 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:35962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abndcda6ubjKNq_cu4YobgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:02:27.121857 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:02:38.991669 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.244.43:37044] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abndjuw_le52K8_3pV1ucQAAAgU"]
[Tue Mar 17 20:02:39.007276 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.228.61:60306] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abndjcU6Sx0TG1YjmQjQkAAAApc"]
[Tue Mar 17 20:02:48.124185 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:32774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:10.121148 2026] [proxy_fcgi:error] [pid 11816:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:32.125874 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:54.125877 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:55.193033 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:33982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnd29Y0UrI5A3LftIwgcQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:04:16.133846 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:04:23.611566 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:45012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnd9-yqAr6etmhZHNpInAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:04:25.280974 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.243.128:59804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnd-fPqhzTj3BvfDX-pigAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:04:38.129789 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:05:00.445799 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:05:23.123346 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35280] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:05:45.137946 2026] [proxy_fcgi:error] [pid 11088:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:06:07.105792 2026] [proxy_fcgi:error] [pid 7004:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:06:29.045929 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:06:52.151449 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:07:14.133789 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:07:19.016151 2026] [core:alert] [pid 29151:tid 140411666392832] [client 74.7.243.128:59804] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Tue Mar 17 20:07:22.262980 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:53498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abneqhj0p0SRWAqcjGGbvQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:07:31.271583 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:53498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnesxj0p0SRWAqcjGGbxQAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:07:36.364116 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:07:40.230834 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.228.61:52060] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnevOw_le52K8_3pV1uywAAAgw"]
[Tue Mar 17 20:07:40.354222 2026] [core:alert] [pid 25836:tid 140411599251200] [client 74.7.243.128:34624] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Tue Mar 17 20:07:41.189461 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.244.43:58302] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnevfPqhzTj3BvfDX-qFwAAAdY"]
[Tue Mar 17 20:07:59.150355 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:08:21.142092 2026] [proxy_fcgi:error] [pid 25836:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:08:42.128354 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:08:46.541949 2026] [core:alert] [pid 26799:tid 140411708356352] [client 74.7.243.128:58108] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/kbd
[Tue Mar 17 20:09:03.125704 2026] [proxy_fcgi:error] [pid 11088:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:09:26.139791 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:09:49.125801 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:10:03.357818 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:41774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfS9Y0UrI5A3LftIwhLAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 20:10:11.121879 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:10:34.129878 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:10:59.195376 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42178] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:11:14.012200 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:56124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfkta6ubjKNq_cu4YphgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:11:15.201384 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.243.128:52774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfk_PqhzTj3BvfDX-quAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:11:15.311930 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:38994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfk9Y0UrI5A3LftIwhVAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:11:23.133819 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:11:45.515506 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:42520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfsdY0UrI5A3LftIwhewAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:11:46.129849 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42942] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:11:47.929096 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:60376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfs9a6ubjKNq_cu4YpjwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:12:06.153465 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:33990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfxuyqAr6etmhZHNpJXAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:12:08.137811 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:12:22.042123 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:44288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnf1ta6ubjKNq_cu4YpqwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:12:24.459508 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.243.128:40792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnf2MU6Sx0TG1YjmQjRmwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:12:31.137816 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:12:41.843213 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.244.43:51056] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnf6dY0UrI5A3LftIwhmQAAAYI"]
[Tue Mar 17 20:12:42.155299 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.228.61:45244] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnf6hj0p0SRWAqcjGGcVwAAAxg"]
[Tue Mar 17 20:12:53.125807 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:13:15.121837 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:13:37.125788 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45910] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:00.133792 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:27.125884 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:55.121112 2026] [proxy_fcgi:error] [pid 7004:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:59.753395 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:55704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abngc-yqAr6etmhZHNpJwAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:15:18.140089 2026] [proxy_fcgi:error] [pid 11088:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:15:42.134896 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:16:03.137783 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:16:24.045867 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:16:45.130018 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:03.700904 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.243.128:36558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abng74h-PF_25v4hFRCNVAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:17:06.133793 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:27.045810 2026] [proxy_fcgi:error] [pid 29151:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:40.271122 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.243.128:52684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhFIh-PF_25v4hFRCNfgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:17:45.750194 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.244.43:53852] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnhF3Ik7brgkOH-rIWwmgAAAVg"]
[Tue Mar 17 20:17:49.373827 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:49.497371 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.228.61:36200] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnhHRj0p0SRWAqcjGGdQQAAAxU"]
[Tue Mar 17 20:18:11.133785 2026] [proxy_fcgi:error] [pid 11088:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53700] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:18:32.133877 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:18:43.322230 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:51622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhU9Y0UrI5A3LftIwi6AAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:18:53.153823 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:19:14.113822 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:19:36.059093 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:19:58.417857 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:20:11.421353 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:44280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhq9Y0UrI5A3LftIwjTgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:20:12.182704 2026] [:error] [pid 16784:tid 140411557287680] [client 74.7.243.128:53332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhrIbSUwQGapzuJ5swKgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:20:20.125817 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:20:44.297890 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:21:06.145784 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:21:28.141828 2026] [proxy_fcgi:error] [pid 11088:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60504] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:21:50.065845 2026] [proxy_fcgi:error] [pid 7004:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:22:13.149782 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:22:37.130350 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:22:44.418956 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.244.43:51278] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abniRMdf6f5d65gmYZRgzgAAAsg"]
[Tue Mar 17 20:22:52.903169 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.228.61:39964] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abniTBj0p0SRWAqcjGGd6gAAAxc"]
[Tue Mar 17 20:22:59.129788 2026] [proxy_fcgi:error] [pid 16449:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:23:03.487311 2026] [:error] [pid 17259:tid 140411716749056] [client 74.7.243.128:37840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniVyGalZF7eRqLEoF_RAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:23:11.311036 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.243.128:57562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniX8U6Sx0TG1YjmQjTkgAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:23:21.149781 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36186] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:23:43.153768 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:06.130379 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:27.125784 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:49.100241 2026] [proxy_fcgi:error] [pid 7004:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:50.192717 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.243.128:37776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniwoh-PF_25v4hFRCOhQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:24:56.348130 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:43202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniyBj0p0SRWAqcjGGeAwAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:25:12.137873 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:25:13.357933 2026] [:error] [pid 16449:tid 140411674785536] [client 74.7.243.128:43218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni2UeQbjTSjgbmHFr0OwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:25:26.931237 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.243.128:38754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni5vPqhzTj3BvfDX-s2AAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:25:35.153884 2026] [proxy_fcgi:error] [pid 17259:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:25:38.988985 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:41286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni8uyqAr6etmhZHNpK2gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:25:40.324331 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:41324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni9MU6Sx0TG1YjmQjT0AAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:25:57.121820 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:26:19.129859 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:26:25.233978 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.243.128:41336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjIXIk7brgkOH-rIWxYAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:26:27.071821 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:59428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjIsU6Sx0TG1YjmQjT5QAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:26:40.151013 2026] [proxy_fcgi:error] [pid 11088:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:02.845826 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:24.161821 2026] [proxy_fcgi:error] [pid 16449:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:45.529538 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.244.43:49752] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnjccdf6f5d65gmYZRhMgAAAsg"]
[Tue Mar 17 20:27:45.895312 2026] [:error] [pid 16784:tid 140411582465792] [client 74.7.243.128:59444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjcYbSUwQGapzuJ5sw9gAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:27:47.093959 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:54.200382 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.228.61:58086] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnjenIk7brgkOH-rIWxagAAAVQ"]
[Tue Mar 17 20:28:10.895143 2026] [:error] [pid 17259:tid 140411666392832] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjiiGalZF7eRqLEoF_9wAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:28:13.897000 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.243.128:59904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjjWmqtCojLHvu5cKN5QAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:28:14.153835 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:28:36.133802 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47650] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:28:45.706611 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.243.128:59916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjrfPqhzTj3BvfDX-tDQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:28:53.920837 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:48398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjtdY0UrI5A3LftIwkAgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:28:59.329820 2026] [proxy_fcgi:error] [pid 18540:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:29:23.245832 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:29:45.122395 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:29:58.242642 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.241.31:44250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnj9mmqtCojLHvu5cKOCQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:30:06.145819 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:30:28.129251 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:30:49.129776 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50828] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:30:52.021461 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:57754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkLMdf6f5d65gmYZRhfAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:31:10.094201 2026] [proxy_fcgi:error] [pid 16784:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:31:17.431065 2026] [:error] [pid 16449:tid 140411708356352] [client 74.7.243.128:44810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkRUeQbjTSjgbmHFr08wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:31:21.079941 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:55842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkScdf6f5d65gmYZRhgAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:31:33.129793 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:31:55.137803 2026] [proxy_fcgi:error] [pid 16784:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:32:09.024660 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:36082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkeeyqAr6etmhZHNpLkQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 20:32:17.078098 2026] [proxy_fcgi:error] [pid 16784:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:32:39.101878 2026] [proxy_fcgi:error] [pid 11088:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:32:39.535793 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:33980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnklxj0p0SRWAqcjGGehQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:32:42.707901 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:37598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkmta6ubjKNq_cu4YrfAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:32:45.183881 2026] [:error] [pid 16449:tid 140411741927168] [client 74.7.244.43:56254] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnknUeQbjTSjgbmHFr1EwAAAAA"]
[Tue Mar 17 20:32:56.666007 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.228.61:52762] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnkqPPqhzTj3BvfDX-tKgAAAc0"]
[Tue Mar 17 20:33:00.093877 2026] [proxy_fcgi:error] [pid 16449:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:33:10.878322 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:55006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkttY0UrI5A3LftIwkawAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:33:15.613216 2026] [:error] [pid 16449:tid 140411607643904] [client 74.7.243.128:39682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnku0eQbjTSjgbmHFr1HAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:33:21.069919 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:33:21.825406 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:39694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkwcdf6f5d65gmYZRhogAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:33:24.474300 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:37600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkxNa6ubjKNq_cu4YrlwAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:33:30.389813 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:33954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkyuw_le52K8_3pV1xYgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:33:32.953965 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:43314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkzOw_le52K8_3pV1xaAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:33:42.097814 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:04.121826 2026] [proxy_fcgi:error] [pid 11088:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:22.300176 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:56970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnk_uyqAr6etmhZHNpLwQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:34:30.033838 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:44.781481 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:37136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlFNY0UrI5A3LftIwkkwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:34:53.105928 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55478] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:58.143479 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:48028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlIhj0p0SRWAqcjGGe2wAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:18.375576 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:48248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlNoh-PF_25v4hFRCPUAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:19.690669 2026] [:error] [pid 16449:tid 140411674785536] [client 74.7.241.31:55516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlN0eQbjTSjgbmHFr1OwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:20.965891 2026] [:error] [pid 11088:tid 140411683178240] [client 74.7.241.31:55532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlOGmqtCojLHvu5cKORgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:21.126956 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:35:22.462135 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:55548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlOhj0p0SRWAqcjGGe3wAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:23.794580 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:55554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlO4h-PF_25v4hFRCPUwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:25.099416 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:55560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlPYh-PF_25v4hFRCPVAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:26.398214 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:55564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlPoh-PF_25v4hFRCPVgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:27.754929 2026] [:error] [pid 16449:tid 140411733534464] [client 74.7.241.31:51866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlP0eQbjTSjgbmHFr1PgAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:29.053489 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:51882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlQfPqhzTj3BvfDX-tVgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:32.060781 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:57710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlROw_le52K8_3pV1xnAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:34.543364 2026] [:error] [pid 16449:tid 140411725141760] [client 74.7.241.31:51892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlRkeQbjTSjgbmHFr1RwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:35.770753 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:51896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlR3Ik7brgkOH-rIWxsgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:37.042892 2026] [:error] [pid 11088:tid 140411599251200] [client 74.7.241.31:51906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlSWmqtCojLHvu5cKOSwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:38.314295 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:41164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlSuyqAr6etmhZHNpL0AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:39.592542 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:41172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlS9Y0UrI5A3LftIwkmgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:41.331457 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:41188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlTeyqAr6etmhZHNpL0QAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:42.598070 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:41190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlTtY0UrI5A3LftIwkngAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:43.137791 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:35:44.371417 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:41192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlUOyqAr6etmhZHNpL0gAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:45.661373 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:41198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlUXIk7brgkOH-rIWxtQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:46.964730 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:41202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlUmmqtCojLHvu5cKOUAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:48.236127 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:37014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlVIh-PF_25v4hFRCPWAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:49.531171 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.241.31:37030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlVWmqtCojLHvu5cKOUQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:50.867041 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:37036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlVhj0p0SRWAqcjGGe5wAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:55.282995 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.241.31:37038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlW2mqtCojLHvu5cKOVQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:56.630282 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:37040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlXMdf6f5d65gmYZRhxwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:58.971000 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:58032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlXvPqhzTj3BvfDX-tYQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:05.911406 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:58042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlZew_le52K8_3pV1xowAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:07.121842 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:36:10.903273 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:58046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlauyqAr6etmhZHNpL4QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:14.582671 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:46684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlboh-PF_25v4hFRCPZAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:16.961334 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:46694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlcMdf6f5d65gmYZRh0AAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:18.315082 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:44314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlchj0p0SRWAqcjGGe7AAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:22.601028 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:44328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlduw_le52K8_3pV1xqQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:26.901310 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:44332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnleuyqAr6etmhZHNpL6wAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:28.041873 2026] [proxy_fcgi:error] [pid 25836:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:36:28.534702 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:35396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlfIh-PF_25v4hFRCPZgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:30.107065 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:35404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlfuyqAr6etmhZHNpL7QAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:33.344769 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:35406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlgYh-PF_25v4hFRCPbAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:34.619702 2026] [:error] [pid 16449:tid 140411540502272] [client 74.7.241.31:35416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlgkeQbjTSjgbmHFr1eQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:36.072156 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:35430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlhIh-PF_25v4hFRCPbQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:40.069661 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.241.31:35430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnliIh-PF_25v4hFRCPcQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:41.381999 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:49626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnliRj0p0SRWAqcjGGe7gAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:42.708785 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:49640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnliuyqAr6etmhZHNpL9AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:44.084418 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:49648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljOw_le52K8_3pV1xqwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:45.392407 2026] [:error] [pid 11088:tid 140411649607424] [client 74.7.241.31:49658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljWmqtCojLHvu5cKOVwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:46.679005 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.241.31:49662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljuw_le52K8_3pV1xrQAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:46.883892 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:49662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljuw_le52K8_3pV1xrgAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:48.180172 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:59148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlkNY0UrI5A3LftIwkrgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:49.487081 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:59158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlkcdf6f5d65gmYZRh1gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:51.405541 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:59170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlk9a6ubjKNq_cu4Yr2gAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:53.122192 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:36:53.896352 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:59182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnllda6ubjKNq_cu4Yr3AAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:58.262993 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:59196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlmnIk7brgkOH-rIWxwgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:11.486500 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:41434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlp9Y0UrI5A3LftIwkuwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:15.123952 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:37:18.237614 2026] [:error] [pid 11088:tid 140411632822016] [client 74.7.241.31:49160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlrmmqtCojLHvu5cKOXgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:19.997687 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:38474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlrxj0p0SRWAqcjGGe9QAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:21.466950 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:38482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlseyqAr6etmhZHNpMAwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:24.035514 2026] [:error] [pid 11088:tid 140411683178240] [client 74.7.241.31:38494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnltGmqtCojLHvu5cKOYQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:26.870565 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:38496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnltcdf6f5d65gmYZRh2QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:28.230054 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:38556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnluHIk7brgkOH-rIWxyQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:40.843515 2026] [access_compat:error] [pid 6296:tid 140411582465792] [client 216.73.216.191:58540] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 20:37:47.133801 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:37:47.706038 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:38562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlyxj0p0SRWAqcjGGe-wAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:48.895689 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.244.43:40162] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnlzNY0UrI5A3LftIwkwwAAAY0"]
[Tue Mar 17 20:37:53.255094 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:47644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl0da6ubjKNq_cu4Yr6AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:11.121834 2026] [proxy_fcgi:error] [pid 16449:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59128] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:38:12.867278 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.228.61:47644] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnl5PPqhzTj3BvfDX-teAAAAc0"]
[Tue Mar 17 20:38:14.411636 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:47658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl5Yh-PF_25v4hFRCPhgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:15.449900 2026] [:error] [pid 16449:tid 140411691570944] [client 74.7.243.128:36998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl50eQbjTSjgbmHFr1uAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:18.451902 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.243.128:47402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl6oh-PF_25v4hFRCPjAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:38:19.163417 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:37226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl64h-PF_25v4hFRCPjQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:20.886013 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:44566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl7Na6ubjKNq_cu4Yr8AAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:23.839944 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:44582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl7tY0UrI5A3LftIwkzwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:28.488333 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:44584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl9Ih-PF_25v4hFRCPkwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:30.474267 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:36942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl9uyqAr6etmhZHNpMGAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:31.929139 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:36956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl93Ik7brgkOH-rIWx1QAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:33.402839 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:36962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl-ew_le52K8_3pV1xxAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:34.141807 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:38:34.845680 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:36972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl-oh-PF_25v4hFRCPmAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:36.379872 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:36982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl_Ih-PF_25v4hFRCPmQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:37.691732 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:36982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl_Yh-PF_25v4hFRCPmwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:39.364069 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:57156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl_xj0p0SRWAqcjGGfCgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:55.126334 2026] [proxy_fcgi:error] [pid 29151:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:38:59.855917 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:36172] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/lib
[Tue Mar 17 20:39:16.118581 2026] [proxy_fcgi:error] [pid 16449:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:39:17.191676 2026] [:error] [pid 11088:tid 140411683178240] [client 74.7.241.31:40340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmJWmqtCojLHvu5cKOdQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:19.618944 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:48400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmJ3Ik7brgkOH-rIWx3gAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:21.001303 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:48412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmKBj0p0SRWAqcjGGfDwAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:38.122326 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60762] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:39:44.337992 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:48418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmQPPqhzTj3BvfDX-tiwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:57.762567 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:44756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmTew_le52K8_3pV1x6gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:39:58.606627 2026] [mime_magic:error] [pid 11816:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:60498] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/rpm/platform
[Tue Mar 17 20:39:59.101871 2026] [proxy_fcgi:error] [pid 11088:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:32796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:39:59.542702 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:44758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmT9Y0UrI5A3LftIwk3gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:00.950935 2026] [:error] [pid 16449:tid 140411548894976] [client 74.7.241.31:44772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmUEeQbjTSjgbmHFr1yAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:04.921659 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:44786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmVBj0p0SRWAqcjGGfFwAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:06.681918 2026] [:error] [pid 16449:tid 140411582465792] [client 74.7.241.31:44796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmVkeQbjTSjgbmHFr1zQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:20.141789 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:40:21.499050 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:39534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmZeyqAr6etmhZHNpMKQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:25.604851 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:39536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmaeyqAr6etmhZHNpMMQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:27.371181 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:59144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnma3Ik7brgkOH-rIWx4QAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:28.754097 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:59146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmbNa6ubjKNq_cu4Yr_gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:42.125793 2026] [proxy_fcgi:error] [pid 11088:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:40:43.455619 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:39316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnme9a6ubjKNq_cu4YsBgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:44.922200 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:39330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmfGmqtCojLHvu5cKOfQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:45.633819 2026] [core:alert] [pid 17653:tid 140411699963648] [client 74.7.243.128:56458] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/sys/fs/cgroup/systemd/user.slice
[Tue Mar 17 20:40:46.412295 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:39342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmfvPqhzTj3BvfDX-tmQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:48.056925 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:35418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmgHIk7brgkOH-rIWx6AAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:49.358436 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:35430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmgda6ubjKNq_cu4YsCAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:50.927277 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:35442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmgtY0UrI5A3LftIwk6gAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:00.909572 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:41536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmjIh-PF_25v4hFRCPuQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:01.392005 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:48510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmjdY0UrI5A3LftIwk7QAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:41:03.185435 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:41552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmj8df6f5d65gmYZRiCgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:04.929949 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:41:06.172471 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:41558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmkhj0p0SRWAqcjGGfJAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:07.769922 2026] [:error] [pid 16449:tid 140411557287680] [client 74.7.241.31:35196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmk0eQbjTSjgbmHFr10gAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:09.650650 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:35212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmlew_le52K8_3pV1x9AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:11.287089 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:35214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnml-w_le52K8_3pV1x9wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:13.287420 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:35222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmmYh-PF_25v4hFRCPvQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:27.129840 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:41:28.540221 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:46792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqMdf6f5d65gmYZRiHwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:30.038846 2026] [:error] [pid 16449:tid 140411548894976] [client 74.7.241.31:46804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqkeQbjTSjgbmHFr14QAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:30.235228 2026] [:error] [pid 16449:tid 140411716749056] [client 74.7.241.31:46804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqkeQbjTSjgbmHFr14gAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:31.579040 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:46812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqxj0p0SRWAqcjGGfKwAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:33.110623 2026] [:error] [pid 16449:tid 140411616036608] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmrUeQbjTSjgbmHFr15QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:34.562788 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:46836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmrnIk7brgkOH-rIWx8wAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:37.170043 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.241.31:46852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmsBj0p0SRWAqcjGGfLgAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:38.556208 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:34616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmsnIk7brgkOH-rIWx9QAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:40.011079 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:34618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmtIh-PF_25v4hFRCPwgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:41.454361 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:34628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmteyqAr6etmhZHNpMRAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:43.850454 2026] [:error] [pid 16449:tid 140411624429312] [client 74.7.241.31:34638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmtkeQbjTSjgbmHFr16AAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:45.840747 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:34648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmuRj0p0SRWAqcjGGfNgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:47.357287 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:55986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmu4h-PF_25v4hFRCPxQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:48.827204 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.241.31:56002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmvGmqtCojLHvu5cKOngAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:49.025556 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.241.31:56002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmvWmqtCojLHvu5cKOoAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:49.121731 2026] [proxy_fcgi:error] [pid 11088:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:41:50.639551 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:56008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmvhj0p0SRWAqcjGGfOAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:51.915875 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:56010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmv-w_le52K8_3pV1yBgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:53.382051 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:56016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmwfPqhzTj3BvfDX-tvgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:54.762546 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:56018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmwuw_le52K8_3pV1yCgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:56.226275 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:56034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmxMdf6f5d65gmYZRiKQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:57.671153 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:56306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmxRj0p0SRWAqcjGGfQAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:10.141910 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:42:11.451941 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:57302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm0_PqhzTj3BvfDX-txQAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:12.949661 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:57310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm1Ow_le52K8_3pV1yDwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:14.391383 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:57318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm1tY0UrI5A3LftIwk_AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:15.836242 2026] [:error] [pid 11088:tid 140411708356352] [client 74.7.241.31:57326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm12mqtCojLHvu5cKOpQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:16.035271 2026] [:error] [pid 11088:tid 140411725141760] [client 74.7.241.31:57326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm2GmqtCojLHvu5cKOpgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:17.319018 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:38568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm2da6ubjKNq_cu4YsHQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:18.739350 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:38570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm2nIk7brgkOH-rIWx_QAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:32.125820 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:42:54.122154 2026] [proxy_fcgi:error] [pid 16449:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:42:54.747708 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.244.43:60010] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnm_mmqtCojLHvu5cKOvAAAAIg"]
[Tue Mar 17 20:43:01.736568 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.243.128:43022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnBfPqhzTj3BvfDX-t5wAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:43:16.125821 2026] [proxy_fcgi:error] [pid 25836:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:43:19.888917 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.228.61:55032] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnnF3Ik7brgkOH-rIWyCgAAAUk"]
[Tue Mar 17 20:43:21.187849 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:38580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnGew_le52K8_3pV1yPAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:43:23.131956 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:59980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnG8df6f5d65gmYZRiRAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:43:38.131460 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:43:39.967664 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:49604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnK-yqAr6etmhZHNpMbwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:44:00.125789 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:44:22.125815 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:44:29.772978 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:56992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnXdY0UrI5A3LftIwlOAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:44:44.133807 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:06.133122 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:06.854313 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:59156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnngnIk7brgkOH-rIWyOAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:45:28.114398 2026] [proxy_fcgi:error] [pid 11088:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:32.124047 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:60632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnnIh-PF_25v4hFRCQSQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:45:32.809285 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.243.128:49272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnnPPqhzTj3BvfDX-uLwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:45:35.720791 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnn_PqhzTj3BvfDX-uNwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:45:37.135069 2026] [:error] [pid 11088:tid 140411716749056] [client 74.7.241.31:35808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnoWmqtCojLHvu5cKPAAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:45:50.130291 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:54.670790 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:35546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnsuw_le52K8_3pV1ybAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:46:13.069863 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:46:35.129900 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38478] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:46:56.924221 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:44870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnn8PPqhzTj3BvfDX-uigAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:46:57.125909 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:47:19.129783 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:47:24.021981 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.243.128:49272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnoDPPqhzTj3BvfDX-ulAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:47:25.676262 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.243.128:60440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnoDRj0p0SRWAqcjGGfsQAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:47:41.125797 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39398] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:48:03.125802 2026] [proxy_fcgi:error] [pid 11088:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:48:25.069806 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:48:35.441468 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.243.128:60456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnoU_PqhzTj3BvfDX-u1AAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:48:47.055919 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:09.041825 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:31.147665 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:53.121305 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41398] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:59.665248 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.243.128:40116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnop4h-PF_25v4hFRCQzgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:50:08.287113 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:57246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnosOyqAr6etmhZHNpM8wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:50:15.125841 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:50:16.295154 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:37318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnouOw_le52K8_3pV1zAQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:50:37.097815 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:50:47.347996 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:56302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno14h-PF_25v4hFRCQ7QAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:50:59.132826 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:51:03.302833 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno58df6f5d65gmYZRi2gAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:04.255277 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno6Mdf6f5d65gmYZRi2wAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:05.600972 2026] [:error] [pid 11088:tid 140411716749056] [client 74.7.241.31:45118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno6WmqtCojLHvu5cKPXwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:07.118686 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:45124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno64h-PF_25v4hFRCQ9wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:08.495908 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:43900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno7PPqhzTj3BvfDX-vDgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:21.121944 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42650] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:51:23.639187 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:39716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno-8df6f5d65gmYZRi6AAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:51:25.346186 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:39720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno_eyqAr6etmhZHNpNCwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:29.473254 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:39726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpAXIk7brgkOH-rIWy2QAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:31.304031 2026] [:error] [pid 11088:tid 140411641214720] [client 74.7.241.31:42748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpA2mqtCojLHvu5cKPYgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:38.599259 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:32874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpCta6ubjKNq_cu4Ys4gAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:40.042067 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:32886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpDBj0p0SRWAqcjGGgMAAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:41.608009 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:32888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpDew_le52K8_3pV1zKAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:43.069969 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:51:43.154979 2026] [:error] [pid 11088:tid 140411607643904] [client 74.7.241.31:32892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpD2mqtCojLHvu5cKPZAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:44.640927 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:32900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpEOyqAr6etmhZHNpNFQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:46.159689 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.241.31:32906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpEmmqtCojLHvu5cKPZQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:47.617880 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:35926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpE9a6ubjKNq_cu4Ys5QAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:50.303255 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:35940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpFuyqAr6etmhZHNpNGAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:51.999400 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:35942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpF8df6f5d65gmYZRi8wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:53.457872 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:35944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpGYh-PF_25v4hFRCRCQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:01.683262 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:52224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpIYh-PF_25v4hFRCRDwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:04.053805 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:52:05.687592 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:52238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpJew_le52K8_3pV1zNAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:06.977321 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:52248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpJvPqhzTj3BvfDX-vIwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:08.430049 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:52510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpKIh-PF_25v4hFRCREQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:09.919805 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:52514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpKYh-PF_25v4hFRCREwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:09.920424 2026] [mime_magic:error] [pid 25836:tid 140411683178240] (70014)End of file found: [client 74.7.241.31:52514] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:10.454911 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:52528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpKoh-PF_25v4hFRCRFQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:12.565671 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:52532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpLMdf6f5d65gmYZRi-gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:14.058498 2026] [:error] [pid 11088:tid 140411632822016] [client 74.7.241.31:52538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpLmmqtCojLHvu5cKPcQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:27.457844 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:52:27.527522 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:55886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpO4h-PF_25v4hFRCRHgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:29.065866 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:55890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpPRj0p0SRWAqcjGGgTgAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:30.567958 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:55904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpPtY0UrI5A3LftIwl7QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:32.074968 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:55912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQOyqAr6etmhZHNpNKwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:32.585283 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:38354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQBj0p0SRWAqcjGGgUQAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:52:33.667675 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:55922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQYh-PF_25v4hFRCRJAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:35.094724 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:55936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQ3Ik7brgkOH-rIWy8gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:36.591106 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:55950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpRIh-PF_25v4hFRCRJgAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:50.129000 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:52:51.487007 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:46768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpU4h-PF_25v4hFRCRMAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:53.569070 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:46778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpVYh-PF_25v4hFRCRNAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:52:55.825621 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:46788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpV4h-PF_25v4hFRCROAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:52:55.826041 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:57090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpV-w_le52K8_3pV1zSQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:53:12.121806 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:53:13.155918 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:46790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpacdf6f5d65gmYZRjEwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:14.824912 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:38098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpahj0p0SRWAqcjGGgZAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:18.605910 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:38110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpbdY0UrI5A3LftIwl-gAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:19.997683 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:55034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpb9Y0UrI5A3LftIwl_AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:20.759488 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:57090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpcOw_le52K8_3pV1zXQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:53:21.380677 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:55036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpcdY0UrI5A3LftIwmAAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:22.846488 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:55050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpcsdf6f5d65gmYZRjFgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:24.280274 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:55060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpdHIk7brgkOH-rIWzCgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:26.929617 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:55062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpdWmqtCojLHvu5cKPjAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:29.038092 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:53414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpeeyqAr6etmhZHNpNQwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:30.675462 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:53426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpeoh-PF_25v4hFRCRTwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:32.127219 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:53432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpfPPqhzTj3BvfDX-vRgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:33.494459 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:53444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpffPqhzTj3BvfDX-vSQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:34.109842 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45040] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:53:34.819499 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:53446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpfvPqhzTj3BvfDX-vSgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:36.143791 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:53456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpgPPqhzTj3BvfDX-vTgAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:41.343537 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:36786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpheyqAr6etmhZHNpNWAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:43.238032 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:36796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnph-yqAr6etmhZHNpNWwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:56.161206 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:53:58.322295 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:50114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpluyqAr6etmhZHNpNZwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:00.735595 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:50128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpmOyqAr6etmhZHNpNbAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:02.790459 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.241.31:50140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpmmmqtCojLHvu5cKPlQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:04.376070 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:50150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpnNa6ubjKNq_cu4YtKAAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:17.124179 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:54:18.569072 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:57696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpqoh-PF_25v4hFRCRdwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:20.318389 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:57698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnprOw_le52K8_3pV1zagAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:21.833965 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:57714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnprew_le52K8_3pV1zbAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:23.344427 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:57728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpr4h-PF_25v4hFRCRewAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:24.767662 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:57738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpsOyqAr6etmhZHNpNdgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:26.250953 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:57744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpssdf6f5d65gmYZRjLAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:39.141809 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:54:40.454841 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:56614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpwOw_le52K8_3pV1zbwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:40.706651 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:56614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpwOw_le52K8_3pV1zcAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:42.015475 2026] [:error] [pid 11088:tid 140411574073088] [client 74.7.241.31:56624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpwmmqtCojLHvu5cKPpgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:43.523630 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:56640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpw8df6f5d65gmYZRjNwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:44.961516 2026] [:error] [pid 11088:tid 140411658000128] [client 74.7.241.31:56652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpxGmqtCojLHvu5cKPpwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:46.401321 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:56658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpxnIk7brgkOH-rIWzJgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:47.847967 2026] [:error] [pid 11088:tid 140411590858496] [client 74.7.241.31:35572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpx2mqtCojLHvu5cKPqQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:49.257906 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:35584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpyRj0p0SRWAqcjGGggwAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:59.819831 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:38222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp04h-PF_25v4hFRCRiQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:01.580131 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:38238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp1Yh-PF_25v4hFRCRigAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:01.779746 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:38238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp1Yh-PF_25v4hFRCRiwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:02.209964 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:55:04.259223 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:38246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp2Ih-PF_25v4hFRCRjgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:05.851350 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:38256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp2eyqAr6etmhZHNpNfwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:07.225677 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:38260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp29Y0UrI5A3LftIwmJQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:09.039010 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:53932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp3Yh-PF_25v4hFRCRkAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:10.467465 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:53934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp3uw_le52K8_3pV1zdAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:24.125795 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:55:25.460411 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:40224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp7fPqhzTj3BvfDX-vhAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:26.905429 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:40228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp7uyqAr6etmhZHNpNhgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:29.596237 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:52632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp8Yh-PF_25v4hFRCRmgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:31.277353 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:52640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp8xj0p0SRWAqcjGGgkQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:32.871381 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:52650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp9Ih-PF_25v4hFRCRnQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:46.134281 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:55:47.502978 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:59316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqA8df6f5d65gmYZRjSAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:49.772087 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:59318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqBPPqhzTj3BvfDX-viwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:51.863384 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:59330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqBxj0p0SRWAqcjGGglwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:53.330420 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:59338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqCYh-PF_25v4hFRCRowAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:55.729527 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:59346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqCvPqhzTj3BvfDX-vjgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:08.125231 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:56:11.165858 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:35100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqGhj0p0SRWAqcjGGgnQAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:12.474282 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:35108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqHIh-PF_25v4hFRCRqgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:13.987952 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:35116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqHew_le52K8_3pV1ziQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:15.419010 2026] [:error] [pid 11088:tid 140411590858496] [client 74.7.241.31:35120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqH2mqtCojLHvu5cKPvwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:28.661304 2026] [:error] [pid 11088:tid 140411699963648] [client 216.73.216.191:3949] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqLGmqtCojLHvu5cKPxAAAAIU"]
[Tue Mar 17 20:56:30.078399 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:56:31.377649 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:35126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqL4h-PF_25v4hFRCRrgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:37.725404 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:42218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqNYh-PF_25v4hFRCRsQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:39.111829 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:56674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqN_PqhzTj3BvfDX-vnwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:40.445491 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:56676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqOOyqAr6etmhZHNpNoAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:42.199037 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:56690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqOuyqAr6etmhZHNpNowAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:43.635079 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:56698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqO-w_le52K8_3pV1zkwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:45.083264 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:56714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqPXIk7brgkOH-rIWzRAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:46.627061 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:56718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqPuyqAr6etmhZHNpNqQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:48.112847 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:58772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqQMdf6f5d65gmYZRjWAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:49.575070 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:58780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqQew_le52K8_3pV1znAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:51.083862 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:58782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqQ3Ik7brgkOH-rIWzRgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:52.080976 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48274] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:56:52.532118 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:58794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqROw_le52K8_3pV1znQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:55.242282 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:58802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqR-w_le52K8_3pV1zoQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:55.996375 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:39052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqR9a6ubjKNq_cu4YtgAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:56:56.849514 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:58814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSPPqhzTj3BvfDX-vowAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:57.186481 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:58814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSfPqhzTj3BvfDX-vpAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:56:58.443426 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:49904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSoh-PF_25v4hFRCRtQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:59.944338 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:49918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSxj0p0SRWAqcjGGgpwAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:57:01.446350 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:49930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqTYh-PF_25v4hFRCRtgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:14.127103 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:57:16.189864 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:60252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqXBj0p0SRWAqcjGGgsQAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:17.623557 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:44314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqXda6ubjKNq_cu4YtgwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:19.058050 2026] [:error] [pid 11088:tid 140411666392832] [client 74.7.241.31:44322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqX2mqtCojLHvu5cKPzwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:20.491229 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:44326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqYNY0UrI5A3LftIwmRQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:23.019489 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:44340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqYdY0UrI5A3LftIwmRwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:25.050575 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:44346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqZdY0UrI5A3LftIwmSgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:36.125847 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:57:38.118359 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:51130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqcsdf6f5d65gmYZRjYgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:42.685755 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:51136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqdoh-PF_25v4hFRCRwQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:45.535447 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:51148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqeew_le52K8_3pV1zqgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:47.744731 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:52184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqexj0p0SRWAqcjGGgtgAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:58.085870 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:58:00.823572 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:40550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqiOw_le52K8_3pV1zrgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:03.893514 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:40560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqi8df6f5d65gmYZRjcAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:07.009780 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:40564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqjsdf6f5d65gmYZRjcgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:12.429920 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:48158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqlNa6ubjKNq_cu4YtlwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:18.645581 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:51120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqmda6ubjKNq_cu4YtmQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:19.339966 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.244.43:52968] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnqm8df6f5d65gmYZRjdAAAAsU"]
[Tue Mar 17 20:58:20.130279 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:58:20.193431 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:51122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqnOyqAr6etmhZHNpNvgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:22.509396 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:51130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqnhj0p0SRWAqcjGGgvwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:22.621021 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.228.61:49518] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnqnhj0p0SRWAqcjGGgwAAAAxY"]
[Tue Mar 17 20:58:24.040578 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:51142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqoIh-PF_25v4hFRCR0wAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:32.672465 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:51152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqqOw_le52K8_3pV1ztwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:42.133801 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50404] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:58:47.088982 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:51152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqt-w_le52K8_3pV1zwAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:53.055044 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:57486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqvda6ubjKNq_cu4YtpQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:56.151306 2026] [mime_magic:error] [pid 2598:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:57492] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var
[Tue Mar 17 20:58:56.634601 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:57504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqwOyqAr6etmhZHNpNywAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:04.137800 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:59:06.870252 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:40578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqymmqtCojLHvu5cKP9QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:19.339137 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:34426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq1_PqhzTj3BvfDX-vzwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:26.142241 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:59:30.837782 2026] [mime_magic:error] [pid 6296:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:35158] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/include/linux
[Tue Mar 17 20:59:32.355873 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:57832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq5Na6ubjKNq_cu4YttwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:34.828752 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:57842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq5uw_le52K8_3pV1zzgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:38.790888 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:34164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq6ew_le52K8_3pV1zzwAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:42.527148 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:34172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq7oh-PF_25v4hFRCR8QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:44.673523 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:34178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq8OyqAr6etmhZHNpN4gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:48.145834 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:59:49.973406 2026] [:error] [pid 11088:tid 140411607643904] [client 74.7.241.31:34186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq9WmqtCojLHvu5cKQAQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:00:00.989502 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:41438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrAHIk7brgkOH-rIWzqgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:00:10.117867 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:00:32.141921 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:00:54.133785 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:01:08.374953 2026] [core:alert] [pid 31803:tid 140411683178240] [client 216.73.216.191:9238] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 21:01:16.153788 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:01:39.129820 2026] [proxy_fcgi:error] [pid 11088:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:01:40.142094 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:32900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrZOyqAr6etmhZHNpOJQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:01:47.215099 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:33482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnra-w_le52K8_3pV1z7QAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:01:49.762506 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:40616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrbfPqhzTj3BvfDX-wDAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:02:00.148028 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54026] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:02:01.418084 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:33210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrecdf6f5d65gmYZRj8gAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 21:02:04.293456 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.243.128:59046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrfHIk7brgkOH-rIWz6gAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:02:23.025841 2026] [proxy_fcgi:error] [pid 29151:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:02:31.568877 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:60652] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 21:02:31.568976 2026] [access_compat:error] [pid 31803:tid 140411716749056] [client 216.73.216.191:60652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 21:02:46.125848 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:03:08.124496 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:03:21.332071 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.244.43:53602] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnrx9Y0UrI5A3LftIwm1QAAAYE"]
[Tue Mar 17 21:03:23.061205 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.228.61:35548] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnry4h-PF_25v4hFRCSZQAAAQg"]
[Tue Mar 17 21:03:30.869796 2026] [proxy_fcgi:error] [pid 25836:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:03:51.841172 2026] [core:alert] [pid 31803:tid 140411649607424] [client 74.7.243.128:59060] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/kbd
[Tue Mar 17 21:03:54.049838 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:04:05.452845 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.243.128:41296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnr9XIk7brgkOH-rIW0NwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:04:10.138750 2026] [:error] [pid 17653:tid 140411691570944] [client 216.73.216.191:17550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnr-sdf6f5d65gmYZRkLwAAAsY"]
[Tue Mar 17 21:04:10.355851 2026] [:error] [pid 17653:tid 140411641214720] [client 216.73.216.191:17550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnr-sdf6f5d65gmYZRkMAAAAsw"]
[Tue Mar 17 21:04:18.121888 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:04:42.137849 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:05:04.417844 2026] [proxy_fcgi:error] [pid 29151:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:05:12.070323 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:38596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsONa6ubjKNq_cu4YuUQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:05:15.323051 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.243.128:48366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsO4h-PF_25v4hFRCSiQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:05:19.807582 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.243.128:48374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsP2mqtCojLHvu5cKQfQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:05:28.157823 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:05:31.084281 2026] [:error] [pid 29151:tid 140411632822016] [client 216.73.216.191:58327] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsS_PqhzTj3BvfDX-wmAAAAc0"]
[Tue Mar 17 21:05:54.353832 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:06:06.342088 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.243.128:35654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsbXIk7brgkOH-rIW0ZgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:06:17.506588 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:06:21.805814 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 74.7.241.31:55044] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/libexec
[Tue Mar 17 21:06:21.805958 2026] [access_compat:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:55044] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/libexec
[Tue Mar 17 21:06:39.129849 2026] [proxy_fcgi:error] [pid 11088:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:07:01.132641 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:07:22.050301 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:07:23.159333 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsu8df6f5d65gmYZRkkAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:07:44.125814 2026] [proxy_fcgi:error] [pid 11088:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:08:07.165971 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:08:19.355847 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:49626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abns88df6f5d65gmYZRk1QAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:08:20.011338 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.244.43:46836] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abns9OyqAr6etmhZHNpPAAAAAFE"]
[Tue Mar 17 21:08:22.011632 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:48618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abns9nIk7brgkOH-rIW0iwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:08:23.969054 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:48622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abns99a6ubjKNq_cu4YumwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:08:26.960497 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.228.61:35600] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abns-nIk7brgkOH-rIW0jQAAAVE"]
[Tue Mar 17 21:08:30.155159 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:08:52.150130 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:09:02.868341 2026] [:error] [pid 31803:tid 140411658000128] [client 216.73.216.191:19251] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abntHuyqAr6etmhZHNpPFAAAAEo"]
[Tue Mar 17 21:09:15.122668 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:09:39.122402 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:10:02.154484 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:10:06.116580 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abntXsdf6f5d65gmYZRlIgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:10:14.205219 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:51824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abntZoh-PF_25v4hFRCS9gAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:10:23.129895 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:10:45.130736 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:11:08.033878 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:11:30.129867 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:11:53.150051 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:12:16.129822 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:12:38.061899 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:12:59.121779 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:13:21.140385 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:13:22.148031 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.244.43:49166] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnuItY0UrI5A3LftIwn4AAAAYs"]
[Tue Mar 17 21:13:27.009315 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.228.61:37610] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnuJ3Ik7brgkOH-rIW0-QAAAUE"]
[Tue Mar 17 21:13:43.137854 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41072] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:06.113561 2026] [proxy_fcgi:error] [pid 29151:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:09.881623 2026] [:error] [pid 31803:tid 140411683178240] [client 216.73.216.191:44374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuUeyqAr6etmhZHNpPhwAAAEc"]
[Tue Mar 17 21:14:29.129865 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42308] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:36.990582 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:18542] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnubHIk7brgkOH-rIW1EgAAAUk"]
[Tue Mar 17 21:14:51.129828 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:52.331707 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.243.128:49976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnufIh-PF_25v4hFRCTpwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:15:05.669178 2026] [mime_magic:error] [pid 6296:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:43822] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/udev/hwdb.d
[Tue Mar 17 21:15:08.129492 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:36328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnujNY0UrI5A3LftIwoHAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:11.280897 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:47460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuj3Ik7brgkOH-rIW1HgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:13.118023 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:15:14.767556 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.241.31:47474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnukmmqtCojLHvu5cKRngAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:15.366355 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.243.128:41696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuk2mqtCojLHvu5cKRnwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:35.128839 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:15:36.318654 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:47490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuqPPqhzTj3BvfDX-xeQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:57.142367 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:16:19.129839 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45114] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:16:25.296792 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.243.128:35886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnu2Yh-PF_25v4hFRCT3gAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:16:40.899554 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.243.128:35886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnu6Ih-PF_25v4hFRCT5wAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:16:41.129901 2026] [proxy_fcgi:error] [pid 11088:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:16:49.229145 2026] [:error] [pid 6296:tid 140411624429312] [client 216.73.216.191:11900] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnu8XIk7brgkOH-rIW1agAAAU4"]
[Tue Mar 17 21:17:02.142612 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:17:08.122658 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.243.128:45076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvBHIk7brgkOH-rIW1hAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:17:11.684451 2026] [:error] [pid 11088:tid 140411599251200] [client 74.7.243.128:51032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvB2mqtCojLHvu5cKR0QAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:17:25.145793 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:17:47.133798 2026] [proxy_fcgi:error] [pid 25836:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:17:50.886475 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:48916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvLnIk7brgkOH-rIW1oAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:18:09.169771 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:18:14.315731 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:48916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvRnIk7brgkOH-rIW1rgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:18:22.266763 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.244.43:41978] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnvTuyqAr6etmhZHNpP_AAAAFY"]
[Tue Mar 17 21:18:27.907230 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.228.61:36562] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnvU9Y0UrI5A3LftIwocgAAAZU"]
[Tue Mar 17 21:18:32.133793 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:18:54.129783 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48996] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:18:58.535618 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:49072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvcta6ubjKNq_cu4Yv5gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:19:00.243043 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:60280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvdBj0p0SRWAqcjGGikAAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:19:15.130659 2026] [proxy_fcgi:error] [pid 29151:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:19:20.991647 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:60292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnviOw_le52K8_3pV11uQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:22.419092 2026] [:error] [pid 6296:tid 140411624429312] [client 216.73.216.191:57338] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvinIk7brgkOH-rIW15QAAAU4"]
[Tue Mar 17 21:19:22.756697 2026] [:error] [pid 11088:tid 140411641214720] [client 74.7.241.31:33314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvimmqtCojLHvu5cKSFAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:24.967365 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:33318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvjNY0UrI5A3LftIwoiwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:26.350469 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:33320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvjuyqAr6etmhZHNpQLAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:38.125833 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:19:39.630658 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:40820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvm8df6f5d65gmYZRmOQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:42.047937 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:40822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvnta6ubjKNq_cu4Yv-QAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:43.500595 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.241.31:40836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvn2mqtCojLHvu5cKSIgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:45.066296 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:40844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvofPqhzTj3BvfDX-yDwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:46.831323 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.241.31:40854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvommqtCojLHvu5cKSJAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:59.133830 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:20:00.714105 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:45634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvsHIk7brgkOH-rIW2CAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:04.335656 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:41518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvtPPqhzTj3BvfDX-yIAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:05.993002 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:41522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvtdY0UrI5A3LftIworwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:07.189758 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:52824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvt_PqhzTj3BvfDX-yIgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:08.403664 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:52828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvuOyqAr6etmhZHNpQQQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:09.959934 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:52834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvuew_le52K8_3pV110wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:12.251780 2026] [:error] [pid 11088:tid 140411708356352] [client 74.7.241.31:52848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvvGmqtCojLHvu5cKSMwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:20.152021 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51650] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:20:24.287776 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:50836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvyHIk7brgkOH-rIW2DwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:26.325420 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:50842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvyuw_le52K8_3pV114wAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:27.671181 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:50738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvyxj0p0SRWAqcjGGiwwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:29.110825 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:50744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvzdY0UrI5A3LftIwougAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:31.441344 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:50758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvz-w_le52K8_3pV115gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:33.055535 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:50768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv0Rj0p0SRWAqcjGGixwAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:42.138409 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:20:43.570721 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:34978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv2_PqhzTj3BvfDX-yLQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:45.767460 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.241.31:34994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv3WmqtCojLHvu5cKSTgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:46.251161 2026] [:error] [pid 11088:tid 140411725141760] [client 74.7.241.31:34994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv3mmqtCojLHvu5cKSTwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:48.893635 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:41914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv4NY0UrI5A3LftIwowwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:50.623409 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:41916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv4hj0p0SRWAqcjGGizQAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:52.006798 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:41930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv5Ih-PF_25v4hFRCUegAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:54.757567 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:41940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv5uyqAr6etmhZHNpQXAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:56.822983 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:41944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv6Ih-PF_25v4hFRCUgAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:06.189816 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:21:08.303552 2026] [:error] [pid 11088:tid 140411666392832] [client 74.7.241.31:40296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv9GmqtCojLHvu5cKSagAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:09.783030 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:40300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv9Rj0p0SRWAqcjGGi3wAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:11.339187 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:40312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv99Y0UrI5A3LftIwo1QAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:11.747087 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:40312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv99Y0UrI5A3LftIwo1gAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:13.117256 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:40320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv-XIk7brgkOH-rIW2KgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:14.600942 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:40332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv-hj0p0SRWAqcjGGi4QAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:17.103273 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.241.31:40336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv_WmqtCojLHvu5cKSbwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:29.142050 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53430] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:21:30.464104 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:32858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwCnIk7brgkOH-rIW2MAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:32.588812 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:51046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwDNa6ubjKNq_cu4YwTAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:21:33.312090 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:32858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwDXIk7brgkOH-rIW2MgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:34.469078 2026] [mime_magic:error] [pid 29151:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:48620] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/rpm/platform
[Tue Mar 17 21:21:35.111155 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:32866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwD9a6ubjKNq_cu4YwUgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:37.487384 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:43616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwEew_le52K8_3pV12DwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:39.367956 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.241.31:43622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwEmmqtCojLHvu5cKSeQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:40.934561 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:43638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwFNY0UrI5A3LftIwo7wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:42.660048 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:43652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwFtY0UrI5A3LftIwo8wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:44.581897 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:43656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwGIh-PF_25v4hFRCUoAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:46.115260 2026] [:error] [pid 11088:tid 140411641214720] [client 74.7.241.31:43664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwGmmqtCojLHvu5cKSfQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:49.558449 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:52510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwHew_le52K8_3pV12GgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:51.140502 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:21:53.799874 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:52516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwIfPqhzTj3BvfDX-yUgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:56.967883 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:52524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwJNY0UrI5A3LftIwpBgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:58.302239 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:38662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwJvPqhzTj3BvfDX-yVAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:59.907811 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:38662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwJ_PqhzTj3BvfDX-yVgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:22:01.069285 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:38666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwKdY0UrI5A3LftIwpEwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:22:13.125804 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54682] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:22:36.138796 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:22:38.206379 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:37984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwTtY0UrI5A3LftIwpKgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:22:45.288924 2026] [mime_magic:error] [pid 31803:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:48624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd/user
[Tue Mar 17 21:22:58.093856 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:23:20.105917 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:23:22.874313 2026] [mime_magic:error] [pid 6296:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:52499] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 21:23:23.933790 2026] [:error] [pid 11088:tid 140411540502272] [client 74.7.244.43:37776] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnwe2mqtCojLHvu5cKSrAAAAJg"]
[Tue Mar 17 21:23:29.444671 2026] [:error] [pid 17651:tid 140411548894976] [client 74.7.228.61:48752] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnwgRCK1qEtjsNwJhzPXAAAABc"]
[Tue Mar 17 21:23:42.149830 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:24:04.141788 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:24:26.129811 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:24:48.125799 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:25:10.045827 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:25:32.575149 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:1266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnw_NY0UrI5A3LftIwpcQAAAY0"]
[Tue Mar 17 21:25:33.138337 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:25:55.129793 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:26:02.604965 2026] [:error] [pid 17972:tid 140411699963648] [client 74.7.243.128:50858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxGoZ5-GlpYjVrXCrfZQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:26:17.125121 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:26:39.465841 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:26:46.083487 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:40016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxRgkwaGbbGflqUZCtwQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 21:26:48.615958 2026] [mime_magic:error] [pid 6296:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:32792] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/firewalld
[Tue Mar 17 21:27:01.125822 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:27:04.244246 2026] [:error] [pid 29151:tid 140411674785536] [client 216.73.216.191:63817] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxWPPqhzTj3BvfDX-yrAAAAcg"]
[Tue Mar 17 21:27:09.840500 2026] [:error] [pid 2598:tid 140411699963648] [client 216.73.216.191:43877] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxXRj0p0SRWAqcjGGjdAAAAwU"]
[Tue Mar 17 21:27:23.129816 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:27:42.803285 2026] [:error] [pid 18211:tid 140411716749056] [client 216.73.216.191:5376] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxfhcIZFNFgEhGGCRBdQAAA8M"]
[Tue Mar 17 21:27:46.125778 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38332] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:28:07.117800 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:28:22.817961 2026] [:error] [pid 17887:tid 140411708356352] [client 216.73.216.191:22828] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxpgkwaGbbGflqUZCt0wAAAMQ"]
[Tue Mar 17 21:28:25.362061 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.244.43:57202] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnxqXIk7brgkOH-rIW27wAAAUo"]
[Tue Mar 17 21:28:30.110009 2026] [proxy_fcgi:error] [pid 17651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:28:32.874615 2026] [:error] [pid 18211:tid 140411607643904] [client 74.7.228.61:57582] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnxsBcIZFNFgEhGGCRBfAAAA9A"]
[Tue Mar 17 21:28:39.451605 2026] [mime_magic:error] [pid 11088:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:3642] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 21:28:39.451808 2026] [access_compat:error] [pid 11088:tid 140411649607424] [client 216.73.216.191:3642] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 21:28:51.133813 2026] [proxy_fcgi:error] [pid 18057:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39946] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:29:13.689771 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:29:27.776998 2026] [mime_magic:error] [pid 17653:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:59580] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd
[Tue Mar 17 21:29:28.834124 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:42050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx6Mdf6f5d65gmYZRnuwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 21:29:31.345638 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.241.31:52812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx62mqtCojLHvu5cKTOgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:29:36.713841 2026] [proxy_fcgi:error] [pid 11816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:29:40.304408 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:36426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx9HIk7brgkOH-rIW2_gAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:29:45.528372 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:51014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx-da6ubjKNq_cu4YxCwAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:29:46.243236 2026] [core:alert] [pid 17653:tid 140411725141760] [client 74.7.243.128:43262] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Tue Mar 17 21:29:59.337907 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:30:21.157837 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:30:42.229776 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:30:52.269083 2026] [:error] [pid 19507:tid 140411725141760] [client 216.73.216.191:24551] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnyPNY0UrI5A3LftIwpxAAAAYI"]
[Tue Mar 17 21:31:07.146743 2026] [proxy_fcgi:error] [pid 17651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:31:31.665809 2026] [proxy_fcgi:error] [pid 11088:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:31:53.045815 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:32:16.149787 2026] [proxy_fcgi:error] [pid 29151:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:32:24.554766 2026] [mime_magic:error] [pid 18057:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:51028] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self
[Tue Mar 17 21:32:39.213785 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:33:02.142313 2026] [proxy_fcgi:error] [pid 18142:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:33:22.784048 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:54536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abny0sdf6f5d65gmYZRoYwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:33:23.053802 2026] [proxy_fcgi:error] [pid 18057:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49178] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:33:26.880128 2026] [:error] [pid 17972:tid 140411658000128] [client 74.7.244.43:60736] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abny1oZ5-GlpYjVrXCrfwAAAAko"]
[Tue Mar 17 21:33:30.143656 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:38868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abny2oh-PF_25v4hFRCVqwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:33:34.307377 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.228.61:34856] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abny3tY0UrI5A3LftIwp5QAAAZE"]
[Tue Mar 17 21:33:35.413286 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.241.31:59234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abny3xcIZFNFgEhGGCRBsQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:33:45.126893 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:34:07.121776 2026] [proxy_fcgi:error] [pid 18142:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50288] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:34:13.975005 2026] [mime_magic:error] [pid 18142:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:59246] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/boot
[Tue Mar 17 21:34:30.133791 2026] [proxy_fcgi:error] [pid 25836:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:34:43.494974 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:38136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnzIwkwaGbbGflqUZCuJgAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:34:49.105286 2026] [:error] [pid 31803:tid 140411733534464] [client 216.73.216.191:12351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnzKeyqAr6etmhZHNpRiwAAAEE"]
[Tue Mar 17 21:34:52.029832 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:35:15.133791 2026] [proxy_fcgi:error] [pid 29151:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:35:38.157813 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:35:49.431753 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:59032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnzZew_le52K8_3pV13FwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:36:01.153813 2026] [proxy_fcgi:error] [pid 11088:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:36:24.121164 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:36:46.961814 2026] [proxy_fcgi:error] [pid 17972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:37:09.037827 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:37:31.113830 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:37:54.129870 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:38:17.129800 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:38:20.654775 2026] [mime_magic:error] [pid 11816:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:50100] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/cloud/scripts
[Tue Mar 17 21:38:26.702084 2026] [:error] [pid 17972:tid 140411741927168] [client 74.7.243.128:49598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0AoZ5-GlpYjVrXCrgFgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:38:27.903880 2026] [:error] [pid 17972:tid 140411725141760] [client 74.7.244.43:40180] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn0A4Z5-GlpYjVrXCrgFwAAAkI"]
[Tue Mar 17 21:38:36.045206 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.228.61:36058] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn0DOyqAr6etmhZHNpRyQAAAFA"]
[Tue Mar 17 21:38:39.133907 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55098] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:38:46.730761 2026] [mime_magic:error] [pid 17653:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:49604] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/sbin
[Tue Mar 17 21:39:01.129827 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:39:03.245061 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:55816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0J-yqAr6etmhZHNpR8gAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:39:23.129803 2026] [proxy_fcgi:error] [pid 18211:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:39:31.437560 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:46152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0Qoh-PF_25v4hFRCWQgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 21:39:45.125797 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:39:46.210524 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:49892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0UgkwaGbbGflqUZCuoAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 21:40:07.137828 2026] [proxy_fcgi:error] [pid 18211:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56588] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:40:28.103509 2026] [proxy_fcgi:error] [pid 17972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:40:50.121226 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:11.149787 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:21.257665 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.128:35378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0sBj0p0SRWAqcjGGkaQAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:41:33.130366 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:57.081833 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:57.877020 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:59032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn01da6ubjKNq_cu4Yx3wAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:42:20.129802 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:42:23.374524 2026] [:error] [pid 17972:tid 140411666392832] [client 74.7.243.128:53478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn074Z5-GlpYjVrXCrgbQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:42:30.935410 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:37846] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/systemd/netif
[Tue Mar 17 21:42:30.935593 2026] [access_compat:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:37846] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/systemd/netif
[Tue Mar 17 21:42:42.113917 2026] [proxy_fcgi:error] [pid 17972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:05.129794 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:24.753110 2026] [core:alert] [pid 26799:tid 140411658000128] [client 74.7.241.31:58050] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/kbd/keymaps/legacy
[Tue Mar 17 21:43:27.149799 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:27.976098 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.244.43:42042] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn1L9a6ubjKNq_cu4YyBQAAA0U"]
[Tue Mar 17 21:43:33.078517 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.243.128:53478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1NYZ5-GlpYjVrXCrgkgAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:43:37.327410 2026] [:error] [pid 17972:tid 140411582465792] [client 74.7.228.61:53488] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn1OYZ5-GlpYjVrXCrglQAAAlM"]
[Tue Mar 17 21:43:49.161788 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:51.757819 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:55944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1RwkwaGbbGflqUZCvIwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:43:55.542343 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:41330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1S9Y0UrI5A3LftIwqvQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:44:10.106058 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:44:17.555532 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:41340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1Yda6ubjKNq_cu4YyFwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:44:32.125881 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:44:55.045840 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:45:18.045828 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34396] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:45:40.134323 2026] [proxy_fcgi:error] [pid 17972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:46:02.144574 2026] [proxy_fcgi:error] [pid 17972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:46:06.348825 2026] [core:alert] [pid 17972:tid 140411616036608] [client 74.7.243.128:53478] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/log
[Tue Mar 17 21:46:25.132301 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:46:48.137807 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:47:09.121819 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:47:10.338024 2026] [mime_magic:error] [pid 18211:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:52734] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Tue Mar 17 21:47:11.132025 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:40844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn2DwkwaGbbGflqUZCvXQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:47:31.126789 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:47:53.125810 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:48:15.125835 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:48:38.125364 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:48:59.137789 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:49:21.125646 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:49:48.837897 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38840] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:49:57.787563 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:40848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn2tcdf6f5d65gmYZRqqAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:50:11.144324 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39214] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:50:32.069818 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:50:34.003214 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:60576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn22gkwaGbbGflqUZCvxgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:50:35.837870 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:55306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn229Y0UrI5A3LftIwrSgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:50:54.077931 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:51:16.137804 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:51:23.551614 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:44104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Cxj0p0SRWAqcjGGluwAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:27.706355 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:36720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3D-yqAr6etmhZHNpS5gAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:29.851155 2026] [:error] [pid 17972:tid 140411741927168] [client 74.7.241.31:36724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3EYZ5-GlpYjVrXCrhWgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:30.339956 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.243.128:56868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3EhcIZFNFgEhGGCRDQwAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:51:38.141807 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:51:38.824388 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:46974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Gsdf6f5d65gmYZRqzgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:40.331470 2026] [:error] [pid 17972:tid 140411616036608] [client 74.7.241.31:46986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3HIZ5-GlpYjVrXCrhYQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:41.986375 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:46996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3HdY0UrI5A3LftIwrawAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:43.878565 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:47000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3H8df6f5d65gmYZRq0QAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:44.091740 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:47000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3IMdf6f5d65gmYZRq0gAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:45.553409 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:47012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3IYh-PF_25v4hFRCXGAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:51:59.111354 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41112] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:52:00.194499 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:47012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3MIh-PF_25v4hFRCXIAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:02.623637 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:50154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Mhj0p0SRWAqcjGGlzAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:04.271850 2026] [:error] [pid 17972:tid 140411641214720] [client 74.7.241.31:50170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3NIZ5-GlpYjVrXCrhbQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:05.809049 2026] [:error] [pid 17972:tid 140411590858496] [client 74.7.241.31:50180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3NYZ5-GlpYjVrXCrhcgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:08.002461 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:58180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3OOw_le52K8_3pV14ogAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:21.142264 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:52:23.363555 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:39022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3R-yqAr6etmhZHNpTAAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:25.661381 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:39030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Sda6ubjKNq_cu4YylwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:26.197818 2026] [core:alert] [pid 17972:tid 140411574073088] [client 74.7.243.128:58032] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Tue Mar 17 21:52:27.161674 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:39036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3S4h-PF_25v4hFRCXLAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:29.363943 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3TeyqAr6etmhZHNpTBAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:43.149779 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:52:46.344360 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:48830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3XOyqAr6etmhZHNpTEgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:47.971936 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:42152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3X4h-PF_25v4hFRCXPgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:49.552135 2026] [:error] [pid 17972:tid 140411582465792] [client 74.7.241.31:42156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3YYZ5-GlpYjVrXCrhigAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:51.138023 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.241.31:42162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3YxcIZFNFgEhGGCRDZgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:02.211738 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:47126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3bta6ubjKNq_cu4YyrAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:04.129802 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:53:04.818017 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:47130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3cNY0UrI5A3LftIwrmQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:06.471533 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:47132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3csdf6f5d65gmYZRq_wAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:08.055157 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:53190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3dMdf6f5d65gmYZRrBAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:10.435406 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:53202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3duw_le52K8_3pV14uwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:11.952271 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:53216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3d8df6f5d65gmYZRrCwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:14.558095 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:53228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ehj0p0SRWAqcjGGl-AAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:17.998557 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:47966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3fQkwaGbbGflqUZCwCwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:18.199436 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:47966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3fgkwaGbbGflqUZCwDAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:19.171623 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:44758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3f9a6ubjKNq_cu4YytwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:19.726802 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3f8df6f5d65gmYZRrEgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:20.004015 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3gMdf6f5d65gmYZRrEwAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:22.031414 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:47988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3gsdf6f5d65gmYZRrFQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:23.611725 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:48002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3gwkwaGbbGflqUZCwDwAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:24.557894 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:44758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hNa6ubjKNq_cu4YyuwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:25.242342 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:48016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hQkwaGbbGflqUZCwEwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:25.449997 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:48016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hQkwaGbbGflqUZCwFQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:26.126704 2026] [proxy_fcgi:error] [pid 18211:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:53:27.374628 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.241.31:56864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hxcIZFNFgEhGGCRDdQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:27.587506 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:56864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hxcIZFNFgEhGGCRDdgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:30.616153 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:56870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ita6ubjKNq_cu4YywgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:32.309393 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:56886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3jNa6ubjKNq_cu4YyxAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:32.475169 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:56886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3jNa6ubjKNq_cu4YyxgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:35.595343 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:56896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3jgkwaGbbGflqUZCwGgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:37.063544 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:56902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3kda6ubjKNq_cu4YyywAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:48.126682 2026] [proxy_fcgi:error] [pid 11816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:53:49.540881 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:57988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3new_le52K8_3pV141QAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:53.052071 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:57994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ocdf6f5d65gmYZRrIgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:53.252648 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:57994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ocdf6f5d65gmYZRrIwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:54.623344 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:58006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ota6ubjKNq_cu4Yy0wAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:56.878444 2026] [:error] [pid 18211:tid 140411565680384] [client 74.7.241.31:58022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3pBcIZFNFgEhGGCRDhAAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:58.400481 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:36924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3puw_le52K8_3pV143QAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:00.924076 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.241.31:36936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3qMdf6f5d65gmYZRrJwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:10.132925 2026] [proxy_fcgi:error] [pid 17972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:54:12.481651 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:34894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3tMdf6f5d65gmYZRrOAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:15.605443 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:34906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3t-yqAr6etmhZHNpTQwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:18.596829 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:44758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3uda6ubjKNq_cu4Yy3AAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:54:18.622398 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:37644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ugkwaGbbGflqUZCwIwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:18.824966 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:37644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ugkwaGbbGflqUZCwJAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:21.434836 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:37656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3vdY0UrI5A3LftIwruAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:22.951659 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:37658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3vtY0UrI5A3LftIwrvAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:32.125780 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:54:33.490654 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:53382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3yda6ubjKNq_cu4Yy4QAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:37.359114 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:45876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3zcdf6f5d65gmYZRrPwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:39.563477 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:45892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3z9Y0UrI5A3LftIwrwAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:42.710320 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:45904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn30eyqAr6etmhZHNpTVAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:44.916987 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:45918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn31OyqAr6etmhZHNpTVgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:50.983346 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:36048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn32hj0p0SRWAqcjGGmMAAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:54.125797 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:54:55.573659 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:36052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn33xj0p0SRWAqcjGGmNQAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:56.979574 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:36064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn34Bj0p0SRWAqcjGGmOgAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:58.636758 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:32886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn34tY0UrI5A3LftIwrxgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:59.937456 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:32894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn348df6f5d65gmYZRrRgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:01.272718 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:32902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn35dY0UrI5A3LftIwrxwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:04.014282 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:32902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn35dY0UrI5A3LftIwryAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:05.601009 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:32916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn36ew_le52K8_3pV15AAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:05.803719 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:32916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn36ew_le52K8_3pV15AQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:07.159965 2026] [:error] [pid 18211:tid 140411616036608] [client 74.7.241.31:32920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn36xcIZFNFgEhGGCRDkgAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:08.573371 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.241.31:49902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn37Ih-PF_25v4hFRCXggAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:10.143097 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:49906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn37uw_le52K8_3pV15BAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:11.668251 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:49918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn379a6ubjKNq_cu4Yy6gAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:13.216586 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:49926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn38YZ5-GlpYjVrXCrhvAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:15.531725 2026] [:error] [pid 17972:tid 140411658000128] [client 74.7.241.31:49936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn384Z5-GlpYjVrXCrhvwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:16.137825 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:55:17.087480 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:49944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn39da6ubjKNq_cu4Yy7wAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:17.546591 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:49944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn39da6ubjKNq_cu4Yy8AAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:18.867464 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:58588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn39sdf6f5d65gmYZRrUQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:20.438757 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:58592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3-Na6ubjKNq_cu4Yy8wAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:22.635699 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:58600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3-hj0p0SRWAqcjGGmWgAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:24.127987 2026] [:error] [pid 18211:tid 140411632822016] [client 74.7.241.31:58614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3_BcIZFNFgEhGGCRDmAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:26.358887 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:58622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3_uyqAr6etmhZHNpTbwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:27.951511 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:36930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3_9Y0UrI5A3LftIwr0AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:29.475435 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:36944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4AdY0UrI5A3LftIwr0gAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:38.137298 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:55:40.623145 2026] [:error] [pid 17972:tid 140411607643904] [client 74.7.241.31:40418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4DIZ5-GlpYjVrXCrhyAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:41.372385 2026] [:error] [pid 17972:tid 140411641214720] [client 74.7.241.31:40418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4DYZ5-GlpYjVrXCrhyQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:42.918946 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:40432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Dsdf6f5d65gmYZRrZAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:45.786593 2026] [:error] [pid 18211:tid 140411649607424] [client 74.7.241.31:40434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4ERcIZFNFgEhGGCRDpwAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:47.389216 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:50566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4E9a6ubjKNq_cu4Yy_QAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:48.968589 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:50568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4FBj0p0SRWAqcjGGmcQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:59.122014 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:56:00.372301 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:50576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4IOw_le52K8_3pV15HwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:03.963733 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:52182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4I8df6f5d65gmYZRrbQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:05.712575 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:52194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Jcdf6f5d65gmYZRrcgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:08.114218 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:35142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4KAkwaGbbGflqUZCwSQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:09.872184 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:35144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4KYh-PF_25v4hFRCXlgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:11.382097 2026] [:error] [pid 18211:tid 140411590858496] [client 74.7.241.31:35150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4KxcIZFNFgEhGGCRDsQAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:12.919847 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:35166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4LOw_le52K8_3pV15IwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:22.564663 2026] [proxy_fcgi:error] [pid 18211:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:56:23.522251 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:44910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4N8df6f5d65gmYZRrhgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:26.504795 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:44920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Ouw_le52K8_3pV15LAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:27.867306 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:36460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4O-w_le52K8_3pV15MAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:29.323879 2026] [:error] [pid 18211:tid 140411540502272] [client 74.7.241.31:36470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4PRcIZFNFgEhGGCRDtgAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:31.335250 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:36474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4P4h-PF_25v4hFRCXnAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:32.853933 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:36484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4QBj0p0SRWAqcjGGmjwAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:34.351222 2026] [:error] [pid 18211:tid 140411548894976] [client 74.7.241.31:36498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4QhcIZFNFgEhGGCRDugAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:38.034374 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:44208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4RtY0UrI5A3LftIwr8gAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:38.035389 2026] [mime_magic:error] [pid 19507:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:44208] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:38.515855 2026] [:error] [pid 18211:tid 140411674785536] [client 74.7.241.31:44220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4RhcIZFNFgEhGGCRDvgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:39.927356 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:44224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4R-yqAr6etmhZHNpToAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:42.840359 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:44224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4SuyqAr6etmhZHNpTqAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:44.722845 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:44226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4TIh-PF_25v4hFRCXqAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:45.137799 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:56:46.257952 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:44230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Tta6ubjKNq_cu4YzFQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:47.771615 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4T9a6ubjKNq_cu4YzGAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:50.579095 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:41308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4UtY0UrI5A3LftIwr-QAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:52.372869 2026] [:error] [pid 17972:tid 140411725141760] [client 74.7.241.31:41322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4VIZ5-GlpYjVrXCrh3gAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:54.026954 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:41324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4VhcIZFNFgEhGGCRDwQAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:56.752231 2026] [:error] [pid 17972:tid 140411574073088] [client 74.7.241.31:41338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4WIZ5-GlpYjVrXCrh4wAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:06.077832 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47406] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:57:07.530812 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:40132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Y4h-PF_25v4hFRCXuQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:10.876665 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:40148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4ZYh-PF_25v4hFRCXvAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:11.138601 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:40148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Z4h-PF_25v4hFRCXvQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:11.659564 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:40148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Z4h-PF_25v4hFRCXvgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:13.103415 2026] [:error] [pid 18211:tid 140411699963648] [client 74.7.241.31:40158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4aRcIZFNFgEhGGCRDzAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:14.733811 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:40174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4auyqAr6etmhZHNpTuQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:14.734208 2026] [mime_magic:error] [pid 31803:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:40174] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:15.203932 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:40190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4a9Y0UrI5A3LftIwsAAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:16.507147 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:40206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4bNa6ubjKNq_cu4YzJwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:18.647523 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:52534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4boh-PF_25v4hFRCXwgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:20.130275 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:52540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4cOw_le52K8_3pV15PQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:29.045899 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:57:30.412408 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:53568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4euw_le52K8_3pV15RAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:35.115922 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:53570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4fxj0p0SRWAqcjGGmnQAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:36.931839 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:53578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4gIh-PF_25v4hFRCXyQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:38.307271 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:41684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4gsdf6f5d65gmYZRrowAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:39.805858 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:41698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4gxj0p0SRWAqcjGGmnwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:41.376599 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:41702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4hda6ubjKNq_cu4YzLQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:41.903091 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:50400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4heyqAr6etmhZHNpTywAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:51.133786 2026] [proxy_fcgi:error] [pid 17972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48544] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:57:53.646818 2026] [:error] [pid 18211:tid 140411565680384] [client 74.7.243.128:41000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4kRcIZFNFgEhGGCRD3QAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:57.856941 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:43880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4lMdf6f5d65gmYZRr2QAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:59.201286 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:33628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4lwkwaGbbGflqUZCwbQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:00.789839 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:33632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4mMdf6f5d65gmYZRr6QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:02.374103 2026] [:error] [pid 18211:tid 140411624429312] [client 74.7.241.31:33648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4mhcIZFNFgEhGGCRD4QAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:03.878260 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:33660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4mwkwaGbbGflqUZCwdQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:13.165956 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:58:14.619727 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:35748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4poh-PF_25v4hFRCX1QAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:16.290974 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:35764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4qOw_le52K8_3pV15UgAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:18.263210 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:46838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4quyqAr6etmhZHNpT2wAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:20.243146 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:46850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4rOyqAr6etmhZHNpT3AAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:20.395606 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:41004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4rMdf6f5d65gmYZRsAQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:58:21.734942 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:46864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4rcdf6f5d65gmYZRsAgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:23.333492 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:46876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4r9Y0UrI5A3LftIwsGwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:24.579419 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:46876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4sNY0UrI5A3LftIwsHAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:26.543461 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:46892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4sgkwaGbbGflqUZCwewAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:28.599314 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.241.31:52970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4tOw_le52K8_3pV15UwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:29.784025 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.244.43:39900] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn4tdY0UrI5A3LftIwsHwAAAY0"]
[Tue Mar 17 21:58:30.315503 2026] [:error] [pid 18211:tid 140411658000128] [client 74.7.241.31:52972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4thcIZFNFgEhGGCRD6gAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:31.900552 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:52978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4t8df6f5d65gmYZRsBwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:33.547429 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:52980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4uda6ubjKNq_cu4YzPAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:35.051841 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:52988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4u4Z5-GlpYjVrXCriIwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:36.058558 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:58:36.651758 2026] [:error] [pid 18211:tid 140411540502272] [client 74.7.241.31:52990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4vBcIZFNFgEhGGCRD7AAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:38.296483 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:57546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4voh-PF_25v4hFRCX2QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:39.822695 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:57550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4v9Y0UrI5A3LftIwsIQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:46.755359 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:57566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4xtY0UrI5A3LftIwsKQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:48.355343 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:42198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4yNY0UrI5A3LftIwsLAAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:59.128682 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:59:01.363621 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:56662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn41eyqAr6etmhZHNpT5wAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:03.303205 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:56668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn418df6f5d65gmYZRsGgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:03.499153 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.228.61:34970] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn419a6ubjKNq_cu4YzRAAAA1c"]
[Tue Mar 17 21:59:05.027385 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:56678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn42da6ubjKNq_cu4YzRQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:06.654490 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:56692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn42sdf6f5d65gmYZRsHAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:08.259051 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:56540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn43Mdf6f5d65gmYZRsHgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:09.712311 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:56544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn43ew_le52K8_3pV15XQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:11.342482 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:56548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn434h-PF_25v4hFRCX5gAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:22.149871 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:59:25.413926 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:56382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn47OyqAr6etmhZHNpT8QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:30.360382 2026] [:error] [pid 17972:tid 140411708356352] [client 74.7.241.31:43406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn48oZ5-GlpYjVrXCriTwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:31.979242 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:43418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn48-w_le52K8_3pV15agAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:33.511485 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:43434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn49dY0UrI5A3LftIwsOgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:35.103304 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:43450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn499a6ubjKNq_cu4YzTQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:36.675206 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:43458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4-AkwaGbbGflqUZCwnwAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:44.097805 2026] [proxy_fcgi:error] [pid 18211:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:59:45.455613 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:38268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Acdf6f5d65gmYZRsNQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:47.057242 2026] [:error] [pid 25836:tid 140411733534464] [client 74.7.241.31:38276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5A4h-PF_25v4hFRCX7gAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:49.494387 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:38276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5BIh-PF_25v4hFRCX7wAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:51.075262 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:60982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5B8df6f5d65gmYZRsOAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:52.716691 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:60996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5CMdf6f5d65gmYZRsOgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:52.717544 2026] [mime_magic:error] [pid 17653:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:60996] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:54.316992 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:32772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5CuyqAr6etmhZHNpUBQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:58.077513 2026] [:error] [pid 18211:tid 140411674785536] [client 74.7.241.31:41772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5DhcIZFNFgEhGGCRECAAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:59.634871 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:41780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5D4h-PF_25v4hFRCX9QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:00.090545 2026] [mime_magic:error] [pid 17972:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:52942] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Tue Mar 17 22:00:01.328809 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:41782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5EQkwaGbbGflqUZCwqQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:02.613907 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:41782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5EgkwaGbbGflqUZCwqgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:04.036694 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:41782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5FAkwaGbbGflqUZCwqwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:07.129789 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:00:07.411805 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:38240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5F4h-PF_25v4hFRCX9wAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:09.557039 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:38242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Gew_le52K8_3pV15gQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:11.423774 2026] [:error] [pid 18211:tid 140411741927168] [client 74.7.241.31:38244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5GxcIZFNFgEhGGCREFgAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:13.112683 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:38260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5HQkwaGbbGflqUZCwsAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:15.312170 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:38266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5H4h-PF_25v4hFRCX-AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:28.145819 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:00:29.667921 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:40182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5LRj0p0SRWAqcjGGm_QAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:31.279725 2026] [:error] [pid 17972:tid 140411565680384] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5L4Z5-GlpYjVrXCricgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:34.243854 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:40192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5MIh-PF_25v4hFRCX_QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:37.907861 2026] [:error] [pid 18211:tid 140411649607424] [client 74.7.241.31:40206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5NBcIZFNFgEhGGCREIAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:39.414440 2026] [:error] [pid 18211:tid 140411590858496] [client 74.7.241.31:36450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5NxcIZFNFgEhGGCREIgAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:50.125817 2026] [proxy_fcgi:error] [pid 18211:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:00:51.650757 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:47266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Q4h-PF_25v4hFRCYAwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:52.807540 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:47266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5RIh-PF_25v4hFRCYBwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:54.380854 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:47266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Roh-PF_25v4hFRCYDgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:56.525662 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:47274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5SNa6ubjKNq_cu4YzZAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:58.288201 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:56028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5SuyqAr6etmhZHNpUGwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:00.391676 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:56044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5TNa6ubjKNq_cu4YzZgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:01.644663 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:56044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Tda6ubjKNq_cu4YzaAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:09.979622 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:42130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5VdY0UrI5A3LftIwsWAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:12.128811 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:01:13.603486 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:42136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5WdY0UrI5A3LftIwsWgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:16.176455 2026] [:error] [pid 18211:tid 140411691570944] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5XBcIZFNFgEhGGCREMwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:17.425682 2026] [:error] [pid 18211:tid 140411683178240] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5XRcIZFNFgEhGGCRENQAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:20.738028 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:40276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5YBj0p0SRWAqcjGGnFAAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:34.126506 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:01:41.051328 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:57664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5dew_le52K8_3pV15vQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:45.575449 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:40284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5ecdf6f5d65gmYZRsdQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:01:56.072136 2026] [proxy_fcgi:error] [pid 18211:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:02:19.137837 2026] [proxy_fcgi:error] [pid 18211:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:02:27.782201 2026] [mime_magic:error] [pid 17653:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:62650] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 22:02:41.133805 2026] [proxy_fcgi:error] [pid 17972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:03:03.137847 2026] [proxy_fcgi:error] [pid 17972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55468] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:03:17.762872 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.243.128:39834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn51Yh-PF_25v4hFRCYdwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:03:26.129884 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:03:30.410942 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.244.43:60812] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn54ta6ubjKNq_cu4YzsQAAA1E"]
[Tue Mar 17 22:03:47.193830 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:04:10.133797 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:04:11.880105 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.228.61:38586] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn6CwkwaGbbGflqUZCxJgAAAM8"]
[Tue Mar 17 22:04:32.137974 2026] [proxy_fcgi:error] [pid 18211:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:04:54.129815 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57808] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:05:15.133788 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:05:38.085789 2026] [proxy_fcgi:error] [pid 18211:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:06:01.166159 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:06:24.161791 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:06:46.165900 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:07:08.102589 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:07:11.275006 2026] [:error] [pid 18211:tid 140411624429312] [client 74.7.243.128:48102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn6vxcIZFNFgEhGGCRFIwAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:07:22.213806 2026] [core:alert] [pid 17972:tid 140411691570944] [client 216.73.216.191:30062] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 22:07:31.060281 2026] [proxy_fcgi:error] [pid 17972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:07:55.157862 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:08:09.615061 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:53520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn6-QkwaGbbGflqUZCxvgAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:08:17.145779 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34468] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:08:31.454290 2026] [:error] [pid 17972:tid 140411582465792] [client 74.7.244.43:58828] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn7D4Z5-GlpYjVrXCrjWwAAAlM"]
[Tue Mar 17 22:08:38.141832 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:08:46.165867 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:33654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn7HdY0UrI5A3LftIwtNwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:09:00.162728 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:09:12.912955 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.228.61:46780] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn7ONY0UrI5A3LftIwtPgAAAZg"]
[Tue Mar 17 22:09:24.131334 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:09:47.125940 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:09:56.432591 2026] [mime_magic:error] [pid 17972:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:52252] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run
[Tue Mar 17 22:09:56.432825 2026] [access_compat:error] [pid 17972:tid 140411599251200] [client 74.7.241.31:52252] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run
[Tue Mar 17 22:10:10.820589 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:10:33.151141 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:10:55.997875 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:11:17.085925 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:11:40.169443 2026] [proxy_fcgi:error] [pid 18211:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:02.141877 2026] [proxy_fcgi:error] [pid 17972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:08.726763 2026] [:error] [pid 18211:tid 140411649607424] [client 74.7.243.128:53932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn76BcIZFNFgEhGGCRFvwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:12:25.681797 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:48.135697 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:59.596038 2026] [:error] [pid 18211:tid 140411582465792] [client 74.7.243.128:53932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8GxcIZFNFgEhGGCRF4gAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:13:10.121870 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:13:32.145792 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:13:33.238343 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.244.43:49338] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn8PeyqAr6etmhZHNpVnAAAAFg"]
[Tue Mar 17 22:13:54.877813 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:14:17.125780 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:14:18.724556 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.228.61:36834] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn8atY0UrI5A3LftIwt0gAAAY0"]
[Tue Mar 17 22:14:27.875664 2026] [:error] [pid 18211:tid 140411641214720] [client 74.7.243.128:53932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8cxcIZFNFgEhGGCRGHAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:14:40.137824 2026] [proxy_fcgi:error] [pid 17972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:14:43.156365 2026] [mime_magic:error] [pid 17972:tid 140411741927168] (70014)End of file found: [client 74.7.241.31:45104] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/cache/man/id
[Tue Mar 17 22:14:46.899609 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.243.128:46292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8hoh-PF_25v4hFRCaQAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:14:51.088499 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:55662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8i9Y0UrI5A3LftIwt5AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:15:02.361365 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:15:13.589278 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:60178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8oew_le52K8_3pV17yAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:15:24.134220 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:15:27.071285 2026] [core:alert] [pid 19507:tid 140411616036608] [client 74.7.243.128:59022] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib
[Tue Mar 17 22:15:37.574284 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:47076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8ucdf6f5d65gmYZRucAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:15:46.141830 2026] [proxy_fcgi:error] [pid 18211:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:15:53.618732 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:45114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8yda6ubjKNq_cu4Y1KgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:15:55.748120 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:54892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8y-yqAr6etmhZHNpV2wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:16:08.145815 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:16:13.183335 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:54908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn83cdf6f5d65gmYZRuiAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:16:31.129811 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:16:54.133796 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:16:57.749829 2026] [core:alert] [pid 26799:tid 140411582465792] [client 74.7.241.31:38124] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/tuned
[Tue Mar 17 22:17:16.161798 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:17:38.161785 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:17:41.054306 2026] [mime_magic:error] [pid 17887:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:57386] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 22:17:41.054430 2026] [access_compat:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:57386] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 22:18:01.145789 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:18:24.145782 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:18:30.747131 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:34450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn9Zuw_le52K8_3pV18EgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:18:33.283494 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:51620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn9aQkwaGbbGflqUZCzFAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:18:34.418472 2026] [:error] [pid 14206:tid 140411616036608] [client 74.7.244.43:48024] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn9aumGQQJ-Dl0Hqn5FWAAAAA8"]
[Tue Mar 17 22:18:45.135844 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50786] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:19:06.149851 2026] [proxy_fcgi:error] [pid 17972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:19:22.249054 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.228.61:38634] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn9mgkwaGbbGflqUZCzJwAAANc"]
[Tue Mar 17 22:19:28.125834 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:19:51.149813 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:20:12.129804 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:20:35.128670 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53648] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:20:58.145839 2026] [proxy_fcgi:error] [pid 17972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:21:02.055055 2026] [core:alert] [pid 2598:tid 140411557287680] [client 74.7.243.128:44328] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Tue Mar 17 22:21:20.298825 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:21:42.193801 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:21:59.150122 2026] [:error] [pid 17972:tid 140411557287680] [client 74.7.241.31:51630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-N4Z5-GlpYjVrXCrlgQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:04.154681 2026] [proxy_fcgi:error] [pid 18211:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:22:10.199428 2026] [:error] [pid 18211:tid 140411708356352] [client 74.7.243.128:38500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-QhcIZFNFgEhGGCRG-wAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:22:15.807627 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.241.31:59282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-RymAPhZkrhU8w4kQ_gAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:27.149800 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:22:45.252077 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:57580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-ZeyqAr6etmhZHNpWdwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:47.319361 2026] [:error] [pid 18211:tid 140411574073088] [client 74.7.241.31:54314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-ZxcIZFNFgEhGGCRHBgAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:51.225809 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:22:51.439721 2026] [:error] [pid 14206:tid 140411565680384] [client 74.7.241.31:54330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-a-mGQQJ-Dl0Hqn5GHgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:54.086655 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:54338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-buyqAr6etmhZHNpWfAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:02.674982 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:54346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-dtY0UrI5A3LftIwu1QAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:05.403511 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:55332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-eew_le52K8_3pV18oAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:14.165789 2026] [proxy_fcgi:error] [pid 17972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:23:37.137777 2026] [proxy_fcgi:error] [pid 17972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:23:37.778343 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.244.43:56688] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn-mdY0UrI5A3LftIwu3QAAAYs"]
[Tue Mar 17 22:23:38.279275 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:50084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-muyqAr6etmhZHNpWlAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:39.981181 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:42582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-mymAPhZkrhU8w4kRGQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:59.141798 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:24:10.375203 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:42588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-uhj0p0SRWAqcjGGqLAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:12.751551 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:38878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-vOw_le52K8_3pV18zwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:14.345475 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:38890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-vtY0UrI5A3LftIwu5QAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:16.258998 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:38894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-wNY0UrI5A3LftIwu6AAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:17.767514 2026] [:error] [pid 14206:tid 140411658000128] [client 74.7.241.31:39730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-wemGQQJ-Dl0Hqn5GnwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:19.473466 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:39740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-w-oXxyEfFpUF8f8MyQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:20.858974 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:39752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-xBj0p0SRWAqcjGGqLgAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:22.129150 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:24:23.539064 2026] [:error] [pid 14206:tid 140411658000128] [client 74.7.241.31:39754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-x-mGQQJ-Dl0Hqn5GqAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:23.636253 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.228.61:52484] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn-x-oXxyEfFpUF8f8M0QAAAVM"]
[Tue Mar 17 22:24:25.293507 2026] [:error] [pid 18211:tid 140411691570944] [client 74.7.241.31:39760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-yRcIZFNFgEhGGCRHQAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:26.919314 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:39762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-yta6ubjKNq_cu4Y10gAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:30.171260 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:41820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-zOyqAr6etmhZHNpWoQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:33.046374 2026] [:error] [pid 17972:tid 140411574073088] [client 74.7.241.31:41830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-z4Z5-GlpYjVrXCrltAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:34.379197 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:41840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-0oh-PF_25v4hFRCbZAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:36.379472 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:41842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-1CmAPhZkrhU8w4kRPAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:37.943523 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:41836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-1YZ5-GlpYjVrXCrluAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:39.939490 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:41852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-19Y0UrI5A3LftIwu7wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:42.443361 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:41866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-2oh-PF_25v4hFRCbbwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:44.149988 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:24:45.682695 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:41880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-3Yh-PF_25v4hFRCbdwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:47.411634 2026] [:error] [pid 18211:tid 140411716749056] [client 74.7.241.31:36490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-3xcIZFNFgEhGGCRHVAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:48.986783 2026] [:error] [pid 16560:tid 140411708356352] [client 74.7.241.31:36496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-4K6gUSg3B_dEMdIXcwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:50.550935 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:36504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-4ta6ubjKNq_cu4Y13AAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:52.193429 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:36504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-5Na6ubjKNq_cu4Y13gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:52.859260 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:36504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-5Na6ubjKNq_cu4Y13wAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:54.475093 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:36520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-5uw_le52K8_3pV182wAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:56.493664 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.241.31:36534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-6CmAPhZkrhU8w4kRSQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:58.415007 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:40716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-6oh-PF_25v4hFRCbfAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:00.479071 2026] [:error] [pid 18211:tid 140411624429312] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-7BcIZFNFgEhGGCRHWQAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:00.770659 2026] [:error] [pid 18211:tid 140411691570944] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-7BcIZFNFgEhGGCRHWgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:01.247747 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-7RcIZFNFgEhGGCRHWwAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:04.191198 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:40730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-8NY0UrI5A3LftIwu-gAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:06.174061 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:40732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-8gkwaGbbGflqUZCzzQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:07.145956 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:25:08.008130 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:57394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-9BcIZFNFgEhGGCRHYAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:09.807526 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:57402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-9Rj0p0SRWAqcjGGqTAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:13.563053 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:57406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn--ew_le52K8_3pV186AAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:17.749053 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:57420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-_YZ5-GlpYjVrXCrlwwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:20.311072 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:34324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_AMdf6f5d65gmYZRvswAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:20.543690 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:34324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_AMdf6f5d65gmYZRvtAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:22.019397 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:34328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Ahj0p0SRWAqcjGGqUAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:24.178366 2026] [:error] [pid 16560:tid 140411649607424] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_BK6gUSg3B_dEMdIXgwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:24.384084 2026] [:error] [pid 16560:tid 140411607643904] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_BK6gUSg3B_dEMdIXhAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:25.790895 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:34340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_BRj0p0SRWAqcjGGqUQAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:27.439527 2026] [:error] [pid 14206:tid 140411691570944] [client 74.7.241.31:59364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_B-mGQQJ-Dl0Hqn5G4QAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:29.089307 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:25:30.275126 2026] [:error] [pid 14206:tid 140411540502272] [client 74.7.241.31:59364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_CumGQQJ-Dl0Hqn5G6AAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:31.762422 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:59374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_C9a6ubjKNq_cu4Y15gAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:31.983933 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:59374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_C9a6ubjKNq_cu4Y15wAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:33.311478 2026] [:error] [pid 16560:tid 140411741927168] [client 74.7.241.31:59380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Da6gUSg3B_dEMdIXhwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:33.773074 2026] [:error] [pid 16560:tid 140411649607424] [client 74.7.241.31:59380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Da6gUSg3B_dEMdIXiAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:35.143245 2026] [:error] [pid 18211:tid 140411683178240] [client 74.7.241.31:59382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_DxcIZFNFgEhGGCRHZgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:37.226002 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:59398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_EdY0UrI5A3LftIwvBAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:38.971327 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:47194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Eoh-PF_25v4hFRCbiwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:41.048884 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:47210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_FeyqAr6etmhZHNpWuAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:42.581784 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:47220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_FgkwaGbbGflqUZCz3AAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:45.499362 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:47234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_GdY0UrI5A3LftIwvCAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:49.470873 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:58266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_HRj0p0SRWAqcjGGqWQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:52.161773 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35056] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:25:54.343267 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:58272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_ItY0UrI5A3LftIwvCwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:55.918137 2026] [:error] [pid 14206:tid 140411548894976] [client 74.7.241.31:58286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_I-mGQQJ-Dl0Hqn5HAwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:59.521782 2026] [:error] [pid 14206:tid 140411725141760] [client 74.7.241.31:51924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_J-mGQQJ-Dl0Hqn5HCgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:01.487618 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:51936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_KdY0UrI5A3LftIwvDQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:03.013997 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:51946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_K-yqAr6etmhZHNpWvQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:04.491536 2026] [:error] [pid 16560:tid 140411649607424] [client 74.7.241.31:51962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_LK6gUSg3B_dEMdIXnAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:16.161781 2026] [proxy_fcgi:error] [pid 14206:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:26:39.561783 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:27:02.185795 2026] [proxy_fcgi:error] [pid 18211:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37430] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:27:06.423351 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:58014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_asdf6f5d65gmYZRv2wAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:27:27.674019 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:27:49.186058 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:28:11.161795 2026] [proxy_fcgi:error] [pid 17972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:28:35.025788 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:28:38.554908 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.244.43:49444] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn_ximAPhZkrhU8w4kRgwAAAJQ"]
[Tue Mar 17 22:28:42.871381 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:42938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_yuyqAr6etmhZHNpXNgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:28:57.548126 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:29:02.124112 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:57132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_3uw_le52K8_3pV19PAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:03.069285 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:58014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_38df6f5d65gmYZRwIAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:29:07.759083 2026] [:error] [pid 17972:tid 140411683178240] [client 74.7.241.31:40908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_44Z5-GlpYjVrXCrl9QAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:20.065824 2026] [proxy_fcgi:error] [pid 14206:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:29:21.963630 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:36224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_8eyqAr6etmhZHNpXPAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:25.300506 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.228.61:41174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn_9Yh-PF_25v4hFRCb3QAAAQs"]
[Tue Mar 17 22:29:42.057988 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:29:49.507090 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:41330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboADRj0p0SRWAqcjGGqlgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:57.730617 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:35838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware/meson
[Tue Mar 17 22:30:04.157096 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:30:14.031003 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:42280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAJuoXxyEfFpUF8f8NWAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:30:26.025904 2026] [proxy_fcgi:error] [pid 16560:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:30:48.062724 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:30:57.732181 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:54480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAUYh-PF_25v4hFRCcCAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:10.069850 2026] [proxy_fcgi:error] [pid 14206:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:31:15.415568 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:50260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAY9Y0UrI5A3LftIwvagAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:17.244814 2026] [:error] [pid 18211:tid 140411699963648] [client 74.7.241.31:41030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAZRcIZFNFgEhGGCRHtwAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:33.165777 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:31:38.036471 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:50412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAegkwaGbbGflqUZC0VgAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:43.392209 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:36388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAfxj0p0SRWAqcjGGqvQAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:44.716483 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:36390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAgNa6ubjKNq_cu4Y24AAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:47.673855 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:36396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAg9Y0UrI5A3LftIwvbQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:53.201101 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:59168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAiRj0p0SRWAqcjGGqygAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:54.965093 2026] [:error] [pid 18211:tid 140411557287680] [client 74.7.241.31:59178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAihcIZFNFgEhGGCRHvAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:55.137784 2026] [proxy_fcgi:error] [pid 16560:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47590] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:31:56.503461 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:59192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAjNa6ubjKNq_cu4Y24wAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:32:01.664131 2026] [:error] [pid 16560:tid 140411624429312] [client 74.7.243.128:54480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAka6gUSg3B_dEMdIYAAAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Tue Mar 17 22:32:17.127818 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:32:24.710938 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:45512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAqMdf6f5d65gmYZRwQgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:32:39.101830 2026] [proxy_fcgi:error] [pid 16560:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:00.142675 2026] [proxy_fcgi:error] [pid 16560:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:02.672215 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:40618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAzoh-PF_25v4hFRCcKQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:22.133829 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:26.503203 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:4944] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 22:33:26.503333 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 216.73.216.191:4944] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 22:33:33.314312 2026] [:error] [pid 18211:tid 140411666392832] [client 74.7.241.31:59870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA7RcIZFNFgEhGGCRH2gAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:37.682258 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:52224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA8eoXxyEfFpUF8f8N0AAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:40.224721 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.244.43:55880] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboA8-yqAr6etmhZHNpXagAAAEA"]
[Tue Mar 17 22:33:44.053874 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:45.921691 2026] [:error] [pid 16560:tid 140411582465792] [client 74.7.241.31:37142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA-a6gUSg3B_dEMdIYFQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:48.122035 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:44132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA_Na6ubjKNq_cu4Y3GAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:33:52.129314 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:49454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBABj0p0SRWAqcjGGq4wAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:33:53.027311 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:60594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBAQkwaGbbGflqUZC0cwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:54.567007 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:60604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBAuyqAr6etmhZHNpXbAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:56.979507 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:60610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBBNY0UrI5A3LftIwvhgAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:59.965679 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:39138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBB9a6ubjKNq_cu4Y3HgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:06.165858 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:34:08.149426 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:39152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBENa6ubjKNq_cu4Y3JQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:11.639376 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:58298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBE8df6f5d65gmYZRwYAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:15.138821 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:58308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBF9Y0UrI5A3LftIwvigAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:18.687303 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:58322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBGuyqAr6etmhZHNpXcQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:29.133855 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51056] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:34:30.196305 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:40666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBJuyqAr6etmhZHNpXdgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:30.663684 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.228.61:42012] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboBJta6ubjKNq_cu4Y3KAAAA1g"]
[Tue Mar 17 22:34:37.719465 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:49464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBLeoXxyEfFpUF8f8N6gAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:34:38.408498 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:55220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBLgkwaGbbGflqUZC0gQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:45.237908 2026] [:error] [pid 18211:tid 140411658000128] [client 74.7.241.31:41570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBNRcIZFNFgEhGGCRH6AAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:52.129817 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:35:16.165831 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:35:17.904427 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:49912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBVcdf6f5d65gmYZRwjQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:22.014049 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:43300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBWNa6ubjKNq_cu4Y3NAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:25.160306 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:43306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBXQkwaGbbGflqUZC0jAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:26.919507 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:43316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBXsdf6f5d65gmYZRwlwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:28.495661 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:34018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBYBj0p0SRWAqcjGGq6wAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:29.966804 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:34032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBYeyqAr6etmhZHNpXfQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:31.408376 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:34034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBY4h-PF_25v4hFRCcTQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:39.117820 2026] [proxy_fcgi:error] [pid 17972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:35:40.482764 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:60782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBbOyqAr6etmhZHNpXfwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:40.684109 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:60782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBbOyqAr6etmhZHNpXgAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:43.089267 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:60798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBb4h-PF_25v4hFRCcVAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:44.348771 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:60800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBcOw_le52K8_3pV19jwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:46.693852 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:60810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBcta6ubjKNq_cu4Y3OgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:48.168054 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:37272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBdNY0UrI5A3LftIwvlQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:49.628943 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:37280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBdRj0p0SRWAqcjGGq9AAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:51.085779 2026] [:error] [pid 16560:tid 140411691570944] [client 74.7.241.31:37288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBd66gUSg3B_dEMdIYLAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:01.131342 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52546] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:36:04.266667 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:59062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBhIh-PF_25v4hFRCcWQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:06.752946 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:59064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBhuyqAr6etmhZHNpXgwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:08.280599 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:58366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBiIh-PF_25v4hFRCcWgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:09.649785 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:58374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBida6ubjKNq_cu4Y3PAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:11.275015 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:58388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBi-w_le52K8_3pV19lQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:12.793658 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:58392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBjMdf6f5d65gmYZRwrQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:13.200275 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:58392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBjcdf6f5d65gmYZRwrgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:24.105830 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:36:27.551753 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:41824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBm4h-PF_25v4hFRCcXAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:29.187280 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:53002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBnda6ubjKNq_cu4Y3PgAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:35.139078 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:53012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBo9a6ubjKNq_cu4Y3QgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:38.655974 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:33836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBpuoXxyEfFpUF8f8N_AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:39.922318 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:57656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBp8df6f5d65gmYZRwuQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:36:40.928092 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:33850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBqMdf6f5d65gmYZRwuwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:42.616202 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:33854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBquoXxyEfFpUF8f8N_gAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:44.095248 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:33862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBrOyqAr6etmhZHNpXiwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:46.153785 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:36:47.451579 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:33876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBr9a6ubjKNq_cu4Y3SAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:49.174313 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:40822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBsRj0p0SRWAqcjGGq_gAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:50.656149 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:40824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBstY0UrI5A3LftIwvngAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:07.131109 2026] [proxy_fcgi:error] [pid 18211:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:37:08.177052 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:40840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBxOw_le52K8_3pV19qwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:09.823626 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:58004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBxYh-PF_25v4hFRCccAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:11.527478 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:58016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBx4h-PF_25v4hFRCccQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:12.903407 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:58028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboByMdf6f5d65gmYZRw0AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:15.177545 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:58034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBywkwaGbbGflqUZC0ogAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:17.813908 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:58042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBzOyqAr6etmhZHNpXkAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:19.129407 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:54850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBz-oXxyEfFpUF8f8ODAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:29.130146 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:37:30.440516 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:50574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB2uoXxyEfFpUF8f8ODQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:31.935363 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:50580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB2-w_le52K8_3pV19rQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:33.682766 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:50584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB3eoXxyEfFpUF8f8ODgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:35.095231 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:50588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB39a6ubjKNq_cu4Y3TAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:37.271912 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:50590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB4OoXxyEfFpUF8f8ODwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:37.468133 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:50590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB4eoXxyEfFpUF8f8OEAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:39.375608 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:43900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB4xj0p0SRWAqcjGGrCgAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:40.842565 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:43904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB5Bj0p0SRWAqcjGGrCwAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:42.961194 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:43920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB5gkwaGbbGflqUZC0qgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:51.562421 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:37:53.202277 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:59006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB8SmAPhZkrhU8w4kSigAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:54.607866 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:59016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB8ta6ubjKNq_cu4Y3TgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:56.737299 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:59024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB9OyqAr6etmhZHNpXkwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:58.175312 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:36806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB9ta6ubjKNq_cu4Y3TwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:59.619273 2026] [:error] [pid 16560:tid 140411666392832] [client 74.7.241.31:36812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB966gUSg3B_dEMdIYRgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:01.121203 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:36816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB-Yh-PF_25v4hFRCckgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:01.568863 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:57656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB-cdf6f5d65gmYZRw7QAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:38:03.578481 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:36822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB--yqAr6etmhZHNpXlAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:05.077458 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:36832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB_cdf6f5d65gmYZRw7wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:14.038306 2026] [proxy_fcgi:error] [pid 25836:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:38:38.133874 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54634] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:38:41.118942 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.244.43:38124] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboCIeyqAr6etmhZHNpXnAAAAEU"]
[Tue Mar 17 22:39:00.152638 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54960] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:39:22.129823 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:39:26.121066 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:54212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboCTsdf6f5d65gmYZRxGQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:39:32.663957 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.228.61:45162] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboCVOyqAr6etmhZHNpXsQAAAEw"]
[Tue Mar 17 22:39:44.213827 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:40:03.646769 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:57490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboCc8df6f5d65gmYZRxKwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:40:07.526353 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:40:29.123816 2026] [proxy_fcgi:error] [pid 18211:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:40:30.677474 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:57490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboCjsdf6f5d65gmYZRxOQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:40:51.118335 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56344] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:41:13.125806 2026] [proxy_fcgi:error] [pid 16560:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:41:34.121320 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:41:56.125853 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:42:18.153788 2026] [proxy_fcgi:error] [pid 16560:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:42:41.057844 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:42:42.277557 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:37210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDEimAPhZkrhU8w4kTEwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:43:04.129795 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:43:17.731906 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:57598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDNdY0UrI5A3LftIwwcgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:43:26.130153 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:43:26.588503 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:53872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDPuw_le52K8_3pV1-XAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:43:47.071959 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:43:51.292318 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.244.43:35910] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboDVuw_le52K8_3pV1-ZgAAAgE"]
[Tue Mar 17 22:44:09.125774 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:44:30.125293 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:44:32.663557 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.228.61:36580] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboDgNa6ubjKNq_cu4Y3oAAAA0U"]
[Tue Mar 17 22:44:37.371504 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:54200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDhdY0UrI5A3LftIww2QAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:44:52.125842 2026] [proxy_fcgi:error] [pid 16560:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:45:14.133818 2026] [proxy_fcgi:error] [pid 16560:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:45:37.127161 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:45:46.401438 2026] [:error] [pid 17887:tid 140411540502272] [client 216.73.216.191:11086] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDygkwaGbbGflqUZC1RgAAANg"]
[Tue Mar 17 22:45:59.085776 2026] [proxy_fcgi:error] [pid 16560:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:46:01.126537 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:53884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboD2QkwaGbbGflqUZC1TgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:46:21.069619 2026] [proxy_fcgi:error] [pid 16560:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:46:43.125795 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:46:50.523013 2026] [:error] [pid 11816:tid 140411557287680] [client 216.73.216.191:31841] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboECuw_le52K8_3pV1-iwAAAhY"]
[Tue Mar 17 22:47:05.037861 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:47:10.334144 2026] [mime_magic:error] [pid 2598:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:57454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/check_mk_agent
[Tue Mar 17 22:47:10.334230 2026] [access_compat:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:57454] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/check_mk_agent
[Tue Mar 17 22:47:27.133767 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:47:49.137809 2026] [proxy_fcgi:error] [pid 16560:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:48:10.428469 2026] [:error] [pid 17887:tid 140411607643904] [client 216.73.216.191:3895] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboEWgkwaGbbGflqUZC1YQAAANA"]
[Tue Mar 17 22:48:11.133445 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:48:33.121803 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:48:34.181961 2026] [mime_magic:error] [pid 15826:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:48212] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Tue Mar 17 22:48:55.037834 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:49:17.149822 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:49:39.133808 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:03.728285 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:26.125828 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35440] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:49.557827 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:56.909245 2026] [access_compat:error] [pid 15826:tid 140411649607424] [client 216.73.216.191:35112] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 22:51:11.118617 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:51:33.137845 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:51:56.009770 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:52:18.137778 2026] [proxy_fcgi:error] [pid 11816:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36968] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:52:40.130049 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:02.153867 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:24.077884 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:45.128472 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:54.363575 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:60400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboFsuw_le52K8_3pV1_gAAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:54:07.125891 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:54:29.112108 2026] [proxy_fcgi:error] [pid 15051:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:54:31.761262 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:48108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboF1wkwaGbbGflqUZC11wAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:54:51.052997 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39104] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:55:06.933452 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:56010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboF-sdf6f5d65gmYZRybwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:55:13.130863 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:55:35.129840 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:55:51.870803 2026] [:error] [pid 19507:tid 140411708356352] [client 216.73.216.191:48860] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboGJ9Y0UrI5A3LftIwxdwAAAYQ"]
[Tue Mar 17 22:55:58.121812 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:56:20.131495 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40232] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:56:44.121888 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40558] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:57:06.126938 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:57:09.411571 2026] [mime_magic:error] [pid 2598:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:50282] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Tue Mar 17 22:57:28.142752 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41232] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:57:50.137886 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:58:12.145877 2026] [proxy_fcgi:error] [pid 16560:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:58:34.022865 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:39698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboGyimAPhZkrhU8w4kUSgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:58:34.107872 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:58:41.911996 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:45380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboG0da6ubjKNq_cu4Y4UQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:58:55.130433 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:59:04.230016 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.244.43:45704] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboG6Mdf6f5d65gmYZRyqQAAAtI"]
[Tue Mar 17 22:59:22.133791 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42750] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:59:43.476234 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.228.61:34436] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboHD-oXxyEfFpUF8f8QAwAAAUM"]
[Tue Mar 17 22:59:44.121826 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:00:07.126813 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:00:29.121811 2026] [proxy_fcgi:error] [pid 16560:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:00:36.926332 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:55018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHROw_le52K8_3pV2AMAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:00:51.052566 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:01:13.125906 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:01:21.473074 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:35904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHcew_le52K8_3pV2AbQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:01:27.252104 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:54394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHd-w_le52K8_3pV2AcQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 23:01:36.137894 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:01:57.533527 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:54410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHlSmAPhZkrhU8w4kUegAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:01:58.057805 2026] [proxy_fcgi:error] [pid 16560:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:02:10.437645 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.243.128:59108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHohj0p0SRWAqcjGGtqAAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:02:19.121786 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:02:41.078023 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:02:48.731667 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:53790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHyNY0UrI5A3LftIwyMAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:02:50.938424 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:47352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHyuyqAr6etmhZHNpZjgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:03:04.125818 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:03:26.123266 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:03:47.133854 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:04:06.011816 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.244.43:42322] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboIFcdf6f5d65gmYZRy6AAAAsQ"]
[Tue Mar 17 23:04:09.140358 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:04:13.870524 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:53756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboIHSmAPhZkrhU8w4kUuwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:04:30.033834 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:04:45.528185 2026] [:error] [pid 16560:tid 140411641214720] [client 74.7.228.61:57572] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboIPa6gUSg3B_dEMdIaJgAAAcw"]
[Tue Mar 17 23:04:52.133776 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:05:13.049829 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47896] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:05:35.053862 2026] [proxy_fcgi:error] [pid 11816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:05:57.117836 2026] [proxy_fcgi:error] [pid 16560:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:06:19.133509 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49026] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:06:41.125835 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:07:02.130482 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:07:23.137769 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:07:44.057839 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:08:06.122814 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:08:27.137844 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:08:49.160164 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:09:07.972678 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.244.43:55014] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboJQwkwaGbbGflqUZC3dQAAAMo"]
[Tue Mar 17 23:09:11.134356 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:09:31.734970 2026] [:error] [pid 19507:tid 140411599251200] [client 216.73.216.191:39999] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboJW9Y0UrI5A3LftIwyjAAAAZE"]
[Tue Mar 17 23:09:33.134200 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:09:48.071852 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.228.61:46578] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboJbOw_le52K8_3pV2A7gAAAgM"]
[Tue Mar 17 23:09:54.121317 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52514] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:10:08.982965 2026] [core:alert] [pid 17653:tid 140411683178240] [client 74.7.241.31:56960] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/kbd/keymaps/legacy
[Tue Mar 17 23:10:16.057869 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:10:40.133771 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:11:06.113821 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53614] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:11:15.101309 2026] [core:alert] [pid 26799:tid 140411716749056] [client 74.7.243.128:41998] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib
[Tue Mar 17 23:11:28.053811 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:11:51.129808 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:12:14.113936 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:12:29.526950 2026] [:error] [pid 15826:tid 140411540502272] [client 216.73.216.191:20196] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKDeoXxyEfFpUF8f8RbQAAAVg"]
[Tue Mar 17 23:12:34.951549 2026] [:error] [pid 16560:tid 140411741927168] [client 216.73.216.191:15720] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKEq6gUSg3B_dEMdIa7QAAAcA"]
[Tue Mar 17 23:12:37.121565 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:12:41.647187 2026] [:error] [pid 17887:tid 140411708356352] [client 216.73.216.191:49436] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKGQkwaGbbGflqUZC3vQAAAMQ"]
[Tue Mar 17 23:12:57.727065 2026] [:error] [pid 16560:tid 140411683178240] [client 216.73.216.191:59217] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKKK6gUSg3B_dEMdIa9QAAAcc"]
[Tue Mar 17 23:12:59.125819 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:13:02.905811 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:32019] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKLta6ubjKNq_cu4Y5_QAAA0Y"]
[Tue Mar 17 23:13:04.796558 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:43666] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKMOoXxyEfFpUF8f8RegAAAUM"]
[Tue Mar 17 23:13:05.245899 2026] [:error] [pid 31803:tid 140411725141760] [client 216.73.216.191:35846] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKMeyqAr6etmhZHNpaIwAAAEI"]
[Tue Mar 17 23:13:19.198224 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:23091] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 23:13:22.125847 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:13:42.248307 2026] [:error] [pid 15051:tid 140411733534464] [client 216.73.216.191:60469] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKVimAPhZkrhU8w4kVMwAAAIE"]
[Tue Mar 17 23:13:44.131303 2026] [proxy_fcgi:error] [pid 16560:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:13:45.668011 2026] [:error] [pid 31803:tid 140411632822016] [client 216.73.216.191:33724] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKWeyqAr6etmhZHNpaMwAAAE0"]
[Tue Mar 17 23:14:06.133778 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:14:08.462207 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.244.43:45926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboKcCmAPhZkrhU8w4kVNwAAAJA"]
[Tue Mar 17 23:14:30.121863 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56406] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:14:50.206693 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.228.61:41338] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboKmtY0UrI5A3LftIwy4AAAAYw"]
[Tue Mar 17 23:14:54.125888 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:15:17.121778 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:15:39.121930 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:16:02.198159 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:16:03.411074 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:42272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboK4-yqAr6etmhZHNpaawAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:16:05.973065 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:38850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboK5da6ubjKNq_cu4Y6QwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:16:10.529254 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:38862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboK6ew_le52K8_3pV2BsAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:16:27.090575 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:16:40.906815 2026] [core:alert] [pid 15826:tid 140411624429312] [client 74.7.241.31:58672] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/systemd/system
[Tue Mar 17 23:16:44.098126 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:55396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/include
[Tue Mar 17 23:16:49.130610 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:17:11.141875 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:17:35.161816 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59186] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:17:58.153819 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59494] AH01075: Error dispatching request to : (polling)